Managed IT Services Training
Unite Tech Managed IT Services
Networking
- Routers
- POE
- Switches
- Computers
- Cabling
- Printers
- Fax Copy Scanners
- IP Cameras
- IP Phone System
- IP Phones
- IP Address Scheme
- Data Storage NAS
- Servers
VoIP Cameras
- Mobotix
VoIP Phone Systems
- Epygi
Web Hosting Providers
- Siteground
- Bluehost
- Hostinger
- WP Engine
- Host Review
Cloud Servers
- Linode
Artificial intelligence (AI)
- Chatgpt
- Outranking.io
WordPress
- AIOSEO
- Elementor Pro
- Google Site Console
- WP-Rocket Pro
- Monsterinsights Pro
- WP Forms Pro
- Custom Permalinks
- Imagify
- Duplicate Page
- Updraftplus
- WP Code
Server Computers
- Load Automation
- Lockdown Process
Windows Computers
- Load Automation
- Antivirus
- Lockdown Process
Remote Access Software
- Teamviewer
- Google Meet
Screen Recording Software
- Loom
- Snagit
- Camtasia
Email and Productivity Software
- Microsoft Office
- Google Workspace
- Google Office Tools
Backup and disaster
- recovery software
- cloud backup solutions
- data recovery tools)
Cloud services
- Amazon Web Services
- Linode
- Google Cloud
Virtualization software
- VMware
- Hyper-V
Remote monitoring and management software
- Nagios
Customer relationship management (CRM) software
- Vtiger
- HubSpot
- Salesforce
- Monday
Collaboration and communication tools
- Slack
- Google Meet
- Basecamp
- Monday
Cybersecurity All
Cybersecurity: Training Guide
- Introduction to Cybersecurity
- Fundamentals of Cybersecurity
- Password Security Best Practices
- Email Security Best Practice
- Social Engineering Awareness
- Safe Web Browsing and Online Behavior
- Mobile Device Security
- Incident Response and Reporting Procedure
- Cybersecurity Policies and Compliance
- Continuous Learning and Growth In Cybersecurity
Cybersecurity: Risk Assessment Assets
- Introduction into Cybersecurity Risk Assessment
- Fundamentals of Cybersecurity Risk Assessment
- Preparing for a Cybersecurity Risk Assessment
- Conducting a Cybersecurity Risk Assessment
- Cybersecurity Risk Assessment Assets Lists
- Mitigating Cybersecurity Risks
- Compliance and Regulatory Considerations
- Cybersecurity Awareness and Training for Loan Providers
- Cybersecurity Risk Assessment Future case Studies and Examples
- Future Trends in Cybersecurity Risk Assessment for Loan Providers
- Usful Resources and Tools
- A.1 Cybersecurity Risk Assessment Templates
- A.2 Recommended Cybersecurity Frameworks and standards.
- A.3 External References and further Reading Materials.
Cybersecurity: Compliance Hardware & Software
- antivirus
- keylogger
- user restriction rules
- firewalls
- intrusion detection and prevention
Cybersecurity: Vulnerability Testing Tools
- Aircrack-ng: Wireless Network Simplifier
- Burp Suite: Web Application Investigation Suite
- Cisco Talos: Threat Intelligence Expert
- John the Ripper: Cryptographic Code-Breaker
- Maltego: Forensic Footprinting Specialist
- Metasploit: Exploit Harnesser
- Ncat: Network Custodian
- Nessus: Vulnerability Analyst
- Nikto: Web Vulnerability Detector
- Nmap: Network Secrets Decrypter
- OpenVAS: Open Source Vulnerability Scanner
- Snort: Intrusion Deterrent
- Splunk: Big Data Processor
- Wireshark: Network Data Dissector
- ZAP: Web Application Penetration Tester
- All
- Cybersecurty
- networking
- VoIP Cameras
- VoIP Phones
- Remote Access
- Web Solutions
- Data Backup & Restore
- Remote Monitoring
- Gallery Item