Robert Looby is an IT professional seeking to utilize over 10 years of experience and various IT certifications to benefit an IT department. He has strong skills in networking, operating systems like Windows and Linux, server administration, troubleshooting, and virtualization. Looby has experience providing IT support through freelance work and an internship at Georgian College.
IBM Connections Troubleshooting or “Get the Cow off the Ice” LetsConnect
You are an IBM Connections admin and you would like to know how to fix your problems and open tickets?
We will talk about some troubleshooting basics and other useful things to ensure that you have enough skills to get your Connections running smoothly.
There are many areas where you need different debugging skills. We will cover backend like DB2, TDI, SSO and some IBM integrations like Docs, CCM, Cognos or Forms Experience Builder. Of course we will cover Connections itself, too.
You will also get some helpful best practises which will help you within your daily work.
Best and worst practices deploying IBM ConnectionsLetsConnect
Depending on deployment size, operating system and security considerations you have different options to configure IBM Connections. This session will show good and bad examples on how to do it from multiple customer deployments. We will describe things we found and how you can optimize your systems. Main topics include simple (documented) tasks that should be applied, missing documentation, automated user synchronization, TDI solutions and user synchronization, performance tuning, security optimizing and planning Single Sign On for mail, IBM Sametime and SPNEGO. This is valuable information that will help you to be successful in your next IBM Connections deployment project. Don’t miss it.
Our data should be secure. And our environment too. What we can do for maximizing security in a hybrid environment, where SQL Server exist in two forms: premise and cloud. How to organize our job, how to control our data if we use Windows Azure SQL Database - The Cloud Database. physical security, policy-based management, auditing, encryption, federation, access and authorization. All of those subjects will be covered during my session.
IBM Connections Troubleshooting or “Get the Cow off the Ice” LetsConnect
You are an IBM Connections admin and you would like to know how to fix your problems and open tickets?
We will talk about some troubleshooting basics and other useful things to ensure that you have enough skills to get your Connections running smoothly.
There are many areas where you need different debugging skills. We will cover backend like DB2, TDI, SSO and some IBM integrations like Docs, CCM, Cognos or Forms Experience Builder. Of course we will cover Connections itself, too.
You will also get some helpful best practises which will help you within your daily work.
Best and worst practices deploying IBM ConnectionsLetsConnect
Depending on deployment size, operating system and security considerations you have different options to configure IBM Connections. This session will show good and bad examples on how to do it from multiple customer deployments. We will describe things we found and how you can optimize your systems. Main topics include simple (documented) tasks that should be applied, missing documentation, automated user synchronization, TDI solutions and user synchronization, performance tuning, security optimizing and planning Single Sign On for mail, IBM Sametime and SPNEGO. This is valuable information that will help you to be successful in your next IBM Connections deployment project. Don’t miss it.
Our data should be secure. And our environment too. What we can do for maximizing security in a hybrid environment, where SQL Server exist in two forms: premise and cloud. How to organize our job, how to control our data if we use Windows Azure SQL Database - The Cloud Database. physical security, policy-based management, auditing, encryption, federation, access and authorization. All of those subjects will be covered during my session.
• We sleeping well. And our mobile ringing and ringing. Message: DISASTER! In this session (on slides) we are NOT talk about potential disaster (such BCM); we talk about: And what NOW? New version old my old well-known session updated for whole changes which happened in DBA World in last two-three years.
• So, from the ground to the Sky and further - everything for surviving disaster. Which tasks should have been finished BEFORE. Is virtual or physical SQL matter? We talk about systems, databases, peoples, encryption, passwords, certificates and users.
• In this session (on few demos) I'll show which part of our SQL Server Environment are critical and how to be prepared to disaster. In some documents I'll show You how to be BEST prepared.
Backup? Who cares! Now and Then? We store our data in the cloud. Somewhere in the Cloud. Which Cloud? Who cares! But we are still SQL Server Professionals, so… are we need backup? Should we use newest opportunities or old methods? Are we going a step further or step back? On my session, I will try to find answers for all of those (and more) questions. Demos, cases, and examples from the world of backup. And of course worst practices.
In this GeekOn with Ron session, Ron Oglesby invites Ed Lee of Tintri to go deep on storage including discussions on IOPS, rotating disk, SSD, RAID, hybrid arrays, and more.
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...Unidesk Corporation
Michael Chavez, Sr. Technical Lead at U.S. Federal Agency Joint Task Force North and Nick Brown of Thin Technologies discuss how their Virtual Desktop Infrastructure (VDI) based on Unidesk and VMware software, HP servers, NetApp storage, and ClearCube and Dell Wyse zero clients has improved edge security, reduced administrative overhead, and eased compliance with configuration management guidelines.
IBM Connections Adminblast - Connect17 (DEV 1268)Nico Meisenzahl
Buckle up, join Christoph and Nico and get ready to learn 50 tips and tricks you can implement right away to improve your IBM Connections environment. Your users will thank you as they too benefit from this best practice list gathered from real-world projects while deploying and administering IBM Connections On-premises. Walk away with knowledge covering anything from Cognos integration, docs, CCM and Forms Experience Builder to the back end and DB2, TDI and SSO.
Engage / Belsoft Collaboration - Using IBM Domino data in IBM Connections – a...Belsoft
The challenge of bringing 50GB of data from an IBM Notes database into IBM Connections and from a local usage to a large audience in and outside of the company
Introduction to SQL Server Analysis services 2008Tobias Koprowski
This is my presentation from 17th Polish SQL server User Group Meeting in Wroclaw. It\'s first part of Quadrology Bussiness Intelligence for ITPros Cycle.
• We sleeping well. And our mobile ringing and ringing. Message: DISASTER! In this session (on slides) we are NOT talk about potential disaster (such BCM); we talk about: And what NOW? New version old my old well-known session updated for whole changes which happened in DBA World in last two-three years.
• So, from the ground to the Sky and further - everything for surviving disaster. Which tasks should have been finished BEFORE. Is virtual or physical SQL matter? We talk about systems, databases, peoples, encryption, passwords, certificates and users.
• In this session (on few demos) I'll show which part of our SQL Server Environment are critical and how to be prepared to disaster. In some documents I'll show You how to be BEST prepared.
Backup? Who cares! Now and Then? We store our data in the cloud. Somewhere in the Cloud. Which Cloud? Who cares! But we are still SQL Server Professionals, so… are we need backup? Should we use newest opportunities or old methods? Are we going a step further or step back? On my session, I will try to find answers for all of those (and more) questions. Demos, cases, and examples from the world of backup. And of course worst practices.
In this GeekOn with Ron session, Ron Oglesby invites Ed Lee of Tintri to go deep on storage including discussions on IOPS, rotating disk, SSD, RAID, hybrid arrays, and more.
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...Unidesk Corporation
Michael Chavez, Sr. Technical Lead at U.S. Federal Agency Joint Task Force North and Nick Brown of Thin Technologies discuss how their Virtual Desktop Infrastructure (VDI) based on Unidesk and VMware software, HP servers, NetApp storage, and ClearCube and Dell Wyse zero clients has improved edge security, reduced administrative overhead, and eased compliance with configuration management guidelines.
IBM Connections Adminblast - Connect17 (DEV 1268)Nico Meisenzahl
Buckle up, join Christoph and Nico and get ready to learn 50 tips and tricks you can implement right away to improve your IBM Connections environment. Your users will thank you as they too benefit from this best practice list gathered from real-world projects while deploying and administering IBM Connections On-premises. Walk away with knowledge covering anything from Cognos integration, docs, CCM and Forms Experience Builder to the back end and DB2, TDI and SSO.
Engage / Belsoft Collaboration - Using IBM Domino data in IBM Connections – a...Belsoft
The challenge of bringing 50GB of data from an IBM Notes database into IBM Connections and from a local usage to a large audience in and outside of the company
Introduction to SQL Server Analysis services 2008Tobias Koprowski
This is my presentation from 17th Polish SQL server User Group Meeting in Wroclaw. It\'s first part of Quadrology Bussiness Intelligence for ITPros Cycle.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Robert looby resume
1. www.robertlooby.com | robertlooby@gmail.com
ROBERT LOOBY
SUMMARY Enthusiastic IT professional seeking to benefit an IT Department with complex technical
knowledge and strong time management skills. Skilled at building rapport with diverse
individuals while handling complex technical issues.
IT CERTIFICATIONS Microsoft MCTS: Windows 7 Configuration, CCNA R&S ESSENTIALS, CompTIA A+, Network+
SKILLS Network Products Routers and Switches. Hub and Checkpoint Firewall
Operating Systems Microsoft Windows 7/8/10 Server 8/12/16 Linux Ubuntu
Desktop/Server, CentOS, Debian, Kali,
Hardware Servers, Desktop, Laptops. Routers, Switches, VOIP devices, Smart
Devices
LAN/WAN Technology CISCO, VoIP, Wireless AP’s,
Server Administration Linux, Windows, Active Directory Domain Controllers
Troubleshooting Networking, Linux, Windows,
Networking Windows, Linux OS, Cisco Routing and Switching
Network Protocols TCP/IP DNS, DHCP, OSPF,
Scripting Languages Python, PowerShell, Bash
Databases MySQL, MS SQL Server
Cloud Environments MS Azure, Office 365, Amazon Web Services AWS
Virtualization Technology VMware, ESXi/vSphere, Hyper-V. VirtualBox, Containers Microsoft
VMM, GNS3, Packet Tracer
Browsers Firefox, Chrome, IE, Opera, Brave,
Anti-Virus Applications McAfee and Malwarebytes
Office Applications Visio, Word, Excel, PowerPoint
Other Web-Apps SharePoint
EXPERENCE • Efficient and capable certified networking professional with an abundant amount of
knowledge and a growing amount of credentials
• 10+ years’ experience diagnosing and troubleshooting hardware/software and networking
issues in both Windows and Linux Environments
• Have been building my own labs for over 10+ years that consisted of numerous servers,
desktops, laptops, cisco and ubiquity routers, switches, firewalls, VOIP and Smart Devices
• Time-management, adaptability, decision making, conflict resolution and being a team
player/member are some of my best attributes
• Accumulated a unique skillset that will be a great addition to any team
• Provided computer repair services to private customers also consulting with clients
regarding technical issues and finding the right solutions quickly.
• Knowledge utilizing ticketing systems, providing desktop and end-user support
• Experience configuring Cisco hardware through the cli and config pro
• Disassembled Servers, Routers, Switches, Laptops and removed/replaced hardware
• Diagnosed bios/post/startup issues with servers/desktops/laptops,
2. Page | 2 Robert Looby
• Fresh PC builds, PC Checkups/Diagnostics, Recovering lost data, Virus Protections and
removal
• Creating and Maintaining SharePoint Sites and Web Sites
WORK HISTORY Technical Support Georgian College (Co-op Placement)
2017
TASKS
• Troubleshooting windows server and client issues
• Problem solve an issue and find a solution in a time sensitive manner.
• Helping troubleshooting issues with Windows Clients and Servers.
• Maintaining Active Directory Users and Computers,
• Configuring Windows Server and Desktop computers
• Troubleshooting issues with servers and client computers
• Utilizing my research skills to quickly retrieve the correct information about a specific
topic and providing documentation
• Creating and Configuring Virtual machines in VMware/Hyper-V/VirtualBox hypervisors
• Creating group policy objects/OU’s in windows server 2016
• Created Virtual Machines on both windows and Linux.
• Imaged 40+ computers from Windows 7 to Windows 10.
• Researched possible solutions to technical problems as the occurred.
• Created a Windows 10 lession plan for the fall semester students.
• Completed the Windows 10 Configuring 70-698 labs.
• Create the Windows 10 lesson plan for the students in the fall semester.
• Created Virtual machines.
• Imaging the classroom computers re-imaging from Windows 7 pro to windows 10
education
• Creation of a Linux Virtual Machine (clone deploy) for deploying images
• Provided technical to support to students with computer issues when needed.
• Fixing VMware virtual machine networking properties and internet connectivity issues
• Troubleshooting software installation problems and other common computer related
issues.
• Troubleshooting issues with windows server 2016 and Windows 10 utilizing windows
tools i.e. Event Viewer
• Research and create group policy rules for a WSUS.
• Researched and created some group policy objects to restrict users from accessing
certain features on the windows 10 environment. i.e. Folders, Programs, Control Panel,
Edge etc.
• Locked down the bios on the computers in the classroom so that it would restrict the
users from changing any settings and from booting from changing the boot sequence
• Create and configuring a virtual machine for WSUS (Windows Server Update Services) to
push updates to the 40 client computers and 5 servers in the windows 10 environment in
a classroom
• Configure client group policies by creating policies like configure automatic updates,
enable client side targeting and Specify intranet Microsoft Update service location.
• Troubleshooting connectivity issues that occurred when trying to push the updates to
the clients and servers in the WUSUS console and using utilities like rsop (result set of
policy) this tool shows the group policy’s that are set on a windows client or server.
• Research finding compatible hard drives for a specific IBM server so that the server could
run without any thermal overheating issues.
• Setting up an FTP server so the students can access the required files (Windows’s 7
Windows Server 2012 and other software) to complete the required labs that are
required for class
3. Page | 3 Robert Looby
• Set up a Windows Server 2016 and the Hyper-V role on a physical server so that the
teachers could have a tool to work alongside the students in creating Virtual Machines in
a Hyper-V environment.
FREELANCE WORK
HISTORY
IT Specialist – thePCppl 2010 –
Present
• Providing computer repair services to private costumers.
• Requesting info about hardware/software issues that the client has and document all
concerns.
• Consulting with clients regarding there technical issues and needs.
• Analyzing, Diagnosing/Troubleshooting Basic and Advanced hardware/software issues
on Servers, Desktops, Laptops and Tablets using Windows XP/7/8/10 Server
2003/2008/2012-R2 and Ubuntu Workstation/Server.
• Disassembling systems home and on-site.
• Working with clients do determine the right course of action.
• Removing Bad Hardware/Infected Software
• Solving bios and starting up issues with both windows and Linux.
• Recovering Lost HDD Data.
• Defragmenting hard drives.
• Installing Anti-Virus/Malware/Spyware software.
• Check-ups, Computer Set-ups and tune-ups.
• Diagnosing hardware/software Issues.
• Installing Windows, Linux OS on client's computers.
• Checking for any required or need to be installed updates on Windows/Linux systems.
• Placed orders with vendors for required hardware/software if needed.
• Preforming all repairs with the utmost concern for costumer privacy
SHEET METAL WORKER – AMAR & ASSOCIATES
2010-2016
SHEET METAL WORKER – HIGHVIEW SHEET METAL
2004-2010
EDUCATION Computer Networking Systems Diploma - Georgian College Barrie, Ontario, Canada (in progress)
• Networking Essentials • Enterprise Technical Support
• Windows System Administration • Network Design
• Computer Hardware and
Virtualization
• Emerging Technology and Innovation
• Linux Network Administration • Administrative Scripting
• Routing and Switching Essentials • Windows Service Administration
• Windows Server Administration • Introduction to Information Security
• Linux System Administration • Scaling Networks
• Windows Network Administration • Math for the Computer Industry
4. Page | 4 Robert Looby
• Wide Area Networks • Project Management for Information
Technology
E- LEARNING LYNDA.COM COURSES
• Advanced Topics in Cisco Routing: RIPv2, EIGRP, and OSPF
• SharePoint 2013 Installing and Configuring a Test Environment
• Up and Running with Office 365
• Office Online Essential Training
• Up and Running with Office Mobile for Windows 10
• Administration for Cloud-Based Office 365
• Office 365: Outlook Essential Training
• Up and Running with Office for Android Devices
• Office 365: PowerPoint Essential Training
• Office 365: OneNote Essential Training
• Up and Running with Cisco CLI Switch Configuration 0
• Understanding SSH
• Understanding FTP
• Installing Apache, MySQL, and PHP
• Windows Server 2012 Active Directory: Management and Implementation
• Everything You Need to Know about Subnetting
• Windows Server 2012 Active Directory: Management and Implementation
• Office 365: Access Essential Training
• Windows 8.1 Essential Training
• Office 365: Word Essential Training
• CompTIA A+ Exam Prep (220-801)
• Windows 10 Essential Training
• Up and Running with Cisco CLI Router Configuration
• Up and Running with Ubuntu Desktop Linux
• Windows Server 2012 Hyper-V Essentials
PLURALSIGHT COURSES
• Access Control and Identity Management
• Big Data Analytics with Tableau
• Cisco CCNA: Introduction to Networking
• CompTIA Security+ (SY0-401) Application, Data, and Host Security
• CompTIA Security+ (SY0-401) Compliance and Operational Security
• CompTIA Security+ (SY0-401) Cryptography
• CompTIA Security+ (SY0-401) Network Security
• CompTIA Security+ (SY0-401) Threats and Vulnerabilities
5. Page | 5 Robert Looby
• CompTIA Security+ (SY0-401) Threats and Vulnerabilities
• Ethical Hacking: Enumeration
• Ethical Hacking: Malware Threats
• Ethical Hacking: Reconnaissance/Footprinting
• Ethical Hacking: System Hacking
• Ethical Hacking: Understanding Ethical Hacking
• Ethical Hacking: Understanding Ethical Hacking
• Penetration Testing and Ethical Hacking with Kali Linux
• HTML Fundamentals
• PowerShell: Getting Started
• Windows Server 2012 Hyper-V Essentials
• Windows Server 2012 R2 (70-410) Administer Active Directory
• Windows Server 2012 R2 (70-410) Configure Hyper-V
• Windows Server 2012 R2 (70-410) Core Network Services
• Windows Server 2012 R2 (70-410) Install and Configure Servers
• Windows Server 2012 R2 (70-410) Manage Group Policy
• Windows Server 2012 R2 (70-410) Server Roles and Features