Generative AI is a type of artificial intelligence that creates new content—including text, images, video, code, and music—by learning patterns from existing data using deep learning models.
AI agents are autonomous software systems powered by generative AI and LLMs that perceive their environment, reason, plan, and take actions to achieve specific goals with minimal human oversight
Agentic AI refers to autonomous systems capable of setting goals, planning, and executing complex, multi-step actions with minimal human oversight
AI OverviewRetrieval-Augmented Generation (RAG) is an AI framework that improves Large Language Model (LLM) accuracy by retrieving data from trusted external knowledge bases—such as company documents or databases—before generating a response
n8n is a workflow automation platform that uniquely combines AI capabilities with business process automation.
Model Context Protocol (MCP) architecture is a client-server model designed to standardize how AI applications (Hosts) connect to external data sources and tools (Servers)
History of Artificial Intelligence
What is Artificial Intelligence?
Application of Artificial Intelligence
Artificial Intelligence – Intelligent Systems
Problems in Artificial Intelligence
Approaches used in Artificial Intelligence
Tools used in Artificial Intelligence
Different types of Artificial Intelligence Technology
Agents and Environments in Artificial Intelligence
Artificial Intelligence Expert Systems
Artificial Intelligence – Robotics
What is strong and weak Artificial Intelligence?
What is included in this course?
History of Artificial Intelligence
Application of Artificial Intelligence
Artificial Intelligence – Intelligent Systems
Problems in Artificial Intelligence
Approaches used in Artificial Intelligence
Tools used in Artificial Intelligence
Different types of Artificial Intelligence Technology
Agents and Environments in Artificial Intelligence
Artificial Intelligence Expert Systems
Artificial Intelligence – Robotics
What is strong and weak Artificial Intelligence?
What is Automation?
From Industrial Revolution to Intelligent Workflows
Benefits of Workflow Automation
Understanding Workflows – Concepts & Real-World Examples
Overview of Popular Automation Tools
How AI & Workflow Automation Are Shaping the Future of Work
What is n8n?
How AI + Workflow Automation Is Creating a New Business Model
Introduction to n8n Cloud (Oicial Managed Hosting)
Creating Your n8n Cloud Account + Discount
Managing Workspace
What is Workflow?
What is Automation?
What is Node in n8n?
What is Trigger
What is next after Trigger? It is an Action!
What is API?
What is Webhook?
Connecting External Applications with Credentials
Understanding Nodes in n8n Automation Workflows
Deep Dive into Node Functionality and Parameters
Tracking Your Progress and Building Confidence
Creating First Workflow - An AI Powered ChatBot
Creating your First AI Agent in n8n - Telegram Chat
Create AI Powered Chatbot for Wordpress Website
RAG Agent
Create your Personal Assistant
Data Transformation in n8n: From Raw Feeds to Structured Insights
Updating Partnerstack Partners Sheet and Ailaite Link
Make Money with Full Automated Ailiate Website
Ailiate Video Automation: AI-Generated YouTube Content Using n8n + Sora
Outcome of the Video using the AI Generator Workflow
Welcome to the Self Hosting n8n
Installing n8n Locally with NPM
Updating Self-Hosted n8n (NPM Installation)
Docker Setup for n8n – ReadMe and Key Resources
Deploying n8n with Docker Compose (Standard Stack)
Unlock All Features – Post Install Without SSL (Docker)
Self-Hosted n8n for Homelab Environments
How to Update Your n8n Docker Installation
Setting Environment Variables in Docker Deployments
Setting Up Postgres & Qdrant Credentials for n8n on Docker Stack
Advanced Stack – Docker + Nginx Proxy + Cloudflared
MCP Server & MCP Client Features
Self-Hosting DeepSeek AI Model with Ollama
Course Content
Microsoft Certified: Azure Solutions Architect Expert
Introduction to Microsoft Azure
Ø Introduction to cloud computing
Ø Creating a Microsoft Azure Account
Ø Managing Azure Resources & Subscriptions
Ø Microsoft Azure Architecture
Introduction to ARM & Azure Storage
Ø Azure Resources & Subscriptions
Ø Azure Storage Account & its types
Ø Azure Content Delivery Network (CDN)
Ø Azure Shared Access Signature (SAS)
Ø Virtual Machine Availability Sets
Azure App and Container services
Ø App Service Web App for Containers
Ø Networking for an App Service
Ø IP Address Public & Private IPs
Ø Azure Network Interface Cards (NIC)
Ø Network Security Group (NSG)
Authentication and Authorization in Azure using
Ø Identity and Access Management in Azure
Ø Role Based Access Management (RBAC)
Ø Role Assignment in Azure Resources
Ø Azure Active Directory (Azure AD)
Ø Self Service password Reset (SSPR)
Ø Multi Factor Authentication (MFA)
Course Content
Introduction to Docker
Key Components in Docker
Overview of Docker
Prerequisites for Docker
Setup Docker
Configure Docker
Docker Image
Docker Network
Docker Storage
Docker Container
Docker Compose
Introduction to Kubernetes
Key Components in Kubernetes
Overview of Kubernetes
Prerequisites for Kubernetes
Setup Kubernetes
Configure Kubernetes
Kubernetes Node
Kubernetes Namespace
Kubernetes Volume
Kubernetes Deployment
Kubernetes Pod
Kubernetes Service
Kubernetes Ingress
Kubernetes Role
Kubernetes ClusterRole
Introduction to Ansible
Key Components in Ansible
Overview of Ansible
Prerequisites for Ansible
Ansible Control Machine
Ansible Inventory
Ansible Playbook
Ansible Role
Ansible Vault
Ansible Node
Ansible Tower
Introduction to Terraform
Key Components in Terraform
Overview of Terraform
Prerequisites for Terraform
Setup Terraform
Terraform Provider
Terraform Configuration
Terraform Module
Terraform Cloud
Introduction to Git
Key Components in Git
Overview of Git
Setup Git
Configure Git
Git Repository
Git Service Provider
Git Workflow
Merge Conflict in Git
Git Stash
Git Reset
Introduction to Jenkins
Key Components in Jenkins
Overview of Jenkins
Prerequisites for Jenkins
Setup Jenkins
Configure Jenkins
Jenkins CLI
Jenkins Node
Jenkins Freestyle
Jenkins Pipeline
Jenkins Multibranch Pipeline
Introduction to ELK
AWS-DevOps Course Contents
AWS DevOps Course Objectives
Understand the principles and benefits of DevOps.
Gain proficiency in utilizing AWS services for DevOps practices.
Learn to automate software delivery pipelines using AWS tools.
Implement infrastructure as code (IaC) using AWS CloudFormation.
Develop skills in monitoring, logging, and debugging applications on AWS.
Master continuous integration, and continuous deployment (CI/CD) pipelines on AWS.
Learn best practices for security and compliance in DevOps workflows on AWS.
AWS DevOps Course Syllabus Structure
Introduction to DevOps and AWS Fundamentals
Overview of DevOps principles, culture, and practices.
Introduction to AWS services relevant to DevOps: EC2, S3, IAM, etc.
Setting up AWS CLI and SDK for automation.
Hands-on exercises: Basic AWS account setup and navigation.
Infrastructure as Code (IaC) with AWS CloudFormation
Understanding Infrastructure as Code (IaC) concepts.
Introduction to AWS CloudFormation for provisioning and managing AWS resources.
Writing CloudFormation templates.
Hands-on labs: Creating and deploying stacks using CloudFormation.
Continuous Integration and Deployment (CI/CD) on AWS
Introduction to CI/CD pipelines.
Setting up CI/CD pipelines using AWS CodePipeline.
Integrating AWS CodeBuild and AWS CodeDeploy.
Implementing automated testing in CI/CD pipelines.
Hands-on project: Building a CI/CD pipeline for a sample application.
Monitoring, Logging, and Debugging on AWS
Overview of AWS CloudWatch for monitoring and logging.
Setting up CloudWatch alarms and dashboards.
Utilizing CloudWatch Logs for log aggregation and analysis.
Introduction to AWS X-Ray for application debugging.
Hands-on exercises: Configuring monitoring and logging for sample applications.
Security and Compliance in AWS DevOps
Best practices for securing AWS resources.
Understanding AWS Identity and Access Management (IAM) for access control.
Implementing security automation using AWS Config and AWS Security Hub.
Compliance considerations in DevOps workflows.
Mastering Microsoft Intune & Administration
o Microsoft Intune Introduction.
o What is cloud-native endpoints?
o Exploring Windows 11 Enterprise in detail
o Windows Autopatch
o Bring Your Own Device (BYOD)
o What is Zero Trust?
o Windows 365 for non-managed endpoints
o Endpoint scenarios
o Identity roles and privileges for Microsoft Intune
o Identity roles and privileges for a Windows 365 cloud PC
o Identity roles and privileges for Universal Print
o Licensing requirements
o Using Intune filters when assigning
o Introduction to Microsoft 365
o Cloud-Native Endpoints
o Requirements for Microsoft Intune
o Supported OSes
o Required web browser versions
o Windows 11 hardware requirements
o How do you get Windows 11?
o Intune Administrator licensing
o Entra ID group-based licensing
o Setting the mobile device management authority
o Enabling Windows automatic enrolment
o Using Azure Virtual Desktop with Microsoft Intune
o Microsoft Intune device restrictions for Windows
o Blocking personal Windows devices
o Microsoft Intune device limit restrictions for Windows
o Customizing Intune Company Portal apps, the Company Portal website, and the Intune app
o Microsoft Intune – network URL firewall requirements
o Microsoft Store Endpoint URLs
o Windows 365 endpoint URLs
o Windows Push Notification Services – required URLs
o Windows 365 and Azure Virtual Desktop – required URLs
o Universal Print – required URLs
o Deploying existing Windows devices into Microsoft Intune
o What about on-premises devices?
o Co-management
o Tenant attach
o Microsoft Surface and other Original Equipment Manufacturer (OEM) devices
o Windows Update for Business (WUFB)
o Windows 10 and Windows 11 update rings
o Windows Autopatch
o Windows Autopatch requirements
o How to enable Windows Autopatch
o Optimize Windows Update Rings
o Enable Autopatch for Cloud PCs
o Technical requirements for deploying Windows 365
o Required URLs
o Remote Desktop Protocol (RDP) requirements
o Connect to on-premises networks (optional)
o Learn how to provision a Cloud PC
o Custom image management
o Moving Cloud PCs
o Security baselines
o Restore points
o Connecting to your Cloud PC
o Windows App
o User Actions
o Supported redirections per platform
o Windows 365 Boot shared mode
o Windows 365 Boot dedicated mode
o Windows 365 Switch
o Monitoring and analytics
o Windows 365 AI
o Windows 365 and Intune Suite
o Enterprise app management
o Windows Autopilot overview
o Uploading the hardware ID to Windows Autopilot
o Windows Autopilot for existing devices
o Windows updates during the Out-of-Box Experience (OOBE)
o Enrolment Status Page (ESP)
o Autopilot reporting and diagnostics
o Cloud configuration scenario
o Edge kiosk self-deployment scenario
o Remote Help
o Application delivery via Microsoft Intune
o Different application types you can deploy
o LOB applications
o Win32 apps
o Deploying Microsoft 365 apps
o Office Customization Tool
o Microsoft 365 Apps admin centre
o Deploying Microsoft Teams
o Deploying OneDrive
o Deploying Microsoft Edge
o What is Winget?
o What is MSIX?
o Policy management
o What is the Configuration Service Provider (CSP) policy?
o Windows Push Notification Service (WNS)
o Getting started with policy design
o Policy management within Microsoft Intune
o Migrating existing policies from Azure Directory (AD) – Group Policy management
o Configuring a policy from the Microsoft Intune Security blade
o Configuring your Endpoint security profile
o Windows unhealthy endpoints
o Configuring a policy from the settings catalog
o Configuring administrative templates
o OneDrive Known Folder Move configuration
o OneDrive – block syncing specific file extensions
o Configuring device configuration (template)
o Leveraging a custom policy as the last resort
o Pushing PowerShell scripts – scripted actions to endpoints
o Compliance policies
o Organizational compliance report
o What is Intune Suite?
o How to get started – requesting a trial
o Specialty device management
o Endpoint Privilege Management:
o Enterprise Application Management:
o How to install applications
o How to update/do versioning of applications
o Cloud certificate management (Cloud PKI)
o Advanced Endpoint Analytics
o The future of AI in Windows and Intune
o Copilot in Windows
o What can you use Copilot in Windows for?
o Security Copilot (device management)
o Intune policy validation via Security Copilot
o Troubleshooting Intune via Security Copilot
o Microsoft Identity
o Entra ID Users and groups
o Entra ID join or Hybrid Entra ID – What’s the best option?
o Conditional Access
o BitLocker disk encryption
o Personal Data Encryption
o Self-service Password Reset
o Entra ID password protection
o Password less authentication
o What is and isn’t supported in each password less scenario
o Application Control for Business
o Windows Local Administrator Password Solution
o Microsoft Defender for Endpoint
o Endpoint analytics
o Advanced monitoring
o OS restart history
o Resource performance
o Insights and recommendations – score trends
o Application Reliability
o Windows 365-specific metrics
o Insights and recommendations
o Customizing your baselines
o Cloud PC performance dashboard
o System alerts and email notifications
o Cloud PC utilization
o Resize cloud PCs
o Productivity Score
o Service health
o Advanced Analytics
o ControlUp Enrich
o What is Universal Print?
o Is Universal Print secure and where does my printed data go?
o Universal Print – architecture overview
o Configuring Universal Print
o Print clients – Windows
o Print clients – macOS
o Printers – Universal Print ready printers
o Creating a printer share for a printer
o Testing your Universal Print printer and printer share
o Assigning and deploying cloud printers with Microsoft Intune
Course Content
Introduction to Microsoft Azure
Introduction to cloud computing?
1.2 What is Microsoft Azure?
1.3 Microsoft Azure Services
1.4 Creating a Microsoft Azure Account
1.5 Azure CLI, Azure PowerShell
1.6 Managing Azure Resources and Subscriptions
1.7 Azure Resource Manager
1.8 Microsoft Azure Architecture
ARM and Azure Storage
2.1 Azure Resources and Subscriptions
2.2 Azure Resource Manager
2.3 Managing Azure Resources
2.4 Azure Tags
2.5 Azure Storage Account and its types
2.6 Azure Blob Storage
2.7 Azure Content Delivery Network (CDN)
2.8 Azure Files Storage
2.9 Azure File Sync
Azure storage
3.1 Azure Table Storage
3.2 Azure Queue Storage
3.3 Azure Storage Explorer
3.4 Azure Shared Access Signature (SAS)
3.5 Azure Databox
3.6 Azure Storage Replication
3.7 Data Replication Options
3.8 Azure Import/Export Service
Azure Virtual Machines
4.1 Azure Virtual Machines
4.2 Data Disks in Azure
4.3 Azure VMs and Interfaces
4.4 ARM templates
4.5 VHD templates
4.6 Custom Images of Azure VM
4.7 Virtual Machine Scale Sets
4.8 Virtual Machine Availability Sets
Azure App and Container services
5.1 App Service Web App for Containers
5.2 App Service Plan
5.3 Networking for an App Service
5.4 Deployment Slots
5.5 Container image
5.6 Azure Kubernetes Service
5.7 Azure Container Registry
Azure Networking - I
6.1 Azure Virtual Networks
6.2 Azure VNet Components
6.3 IP Address – Public and Private IPs
6.4 Azure VNet Subnets
6.5 Azure Network Interface Cards (NIC)
6.6 Network Security Group (NSG)
6.7 Route Tables
6.8 Service Tags
6.9 Azure DNS
6.10 Private DNS
Azure Networking – II
7.1 Application Gateway
7.2 Azure Front Door Service
7.3 Azure Traic Manager
7.4 Application Security Groups
7.5 Azure Load Balancers
7.6 Azure Firewall
7.7 Azure Bastion
7.8 Network Watcher
7.9 Azure Express Route
7.10 Express Route Circuits
7.11 Express Route Peering
Authentication and Authorization in Azure using RBAC
8.1 Identity and Access Management in Azure
8.2 Role-Based Access Management (RBAC)
8.3 Role Definitions
8.4 Role Assignment in Azure Resources
8.5 Azure Users and Groups
8.6 RBAC Policies
Microsoft Azure Active Directory
9.1 Azure Active Directory (Azure AD)
9.2 Windows AD Vs Azure AD
9.3 Azure AD Users
9.4 Azure AD Groups
9.5 Azure AD Domains
9.6 Azure AD Tenants
9.7 Authentication Options
9.8 Azure AD Connect
9.9 Self Service Password Reset (SSPR)
9.10 Multi Factor Authentication (MFA)
9.11 Resource Locks
Azure Monitoring
10.1 Azure Monitor
10.2 Azure Metrics
10.3 Log Analytics
10.4 Alerts and Actions
10.5 Application Insights
10.6 Backup Reports
10.7 Recovery Services Vault
10.8 Backing Up Azure Virtual Machines
10.9 VM Backup Policies
10.10 Restoring Azure Virtual Machines
Azure DevOps and Azure Repos
23.1 Azure DevOps architecture
23.2 key features
23.3 Azure DevOps tools
23.4 Azure DevOps organizations and projects
23.5 Introduction to Azure Repos
23.6 Compare TFVC and Git
23.7 Key concepts in Azure repos
23.8 Search your code in Repos
23.9 what is TFVC
23.10 Azure Repos Integrations
Azure Artifacts and Azure Test Plans
24.1 What are azure artifacts
24.2 Key concepts in artifacts
24.3 working with packages
24.4 Feeds
24.5 views and upstream sources
24.6 Connecting to Azure pipelines
24.7 What are Azure test plans
24.8 Exploratory and manual testing
24.9 Test from kanban board
24.10 Creating Test Plans
24.11 Testing web apps
Azure Pipelines
25.1 What is Azure Pipelines
25.2 Why use Azure Pipelines
25.3 Deploying to Azure
25.4 Key concepts in Pipelines
25.5 CI Triggers in pipelines
25.6 YAML Basics
25.7 Ecosystems and Integration
25.8 Setting up CI build
25.9 Adding Tests to the Pipeline
25.10 Agents and Tasks
Azure Boards
26.1 What is Azure Boards
26.2 Why use Azure boards
26.3 agile project management best practices
26.4 Basic concepts of Azure Boards
26.5 Connecting boards to Github
26.6 Work items
26.7 Kanban boards
26.8 Sprints
26.9 Scrum and plans
26.10 Azure Boards integrations
Course Content
Introduction
The History of AWS
AWS Cloud Services Overview
Sign up for AWS
AWS Storage Services
Identity and Access Management
S3 Storage
Create an S3 Bucket
S3 Pricing Tiers
S3 Security and Encryption
S3 Versioning
Lifecycle Management with S3
S3 Object Lock and Glacier Vault Lock
S3 Performance
AWS Organizations and Consolidated Billing
Sharing S3 Buckets Across Accounts
Cross-Region Replication
S3 Transfer Acceleration
AWS DataSync
CloudFront
Create a CloudFront Distribution
CloudFront Signed URLs and Cookies
Snowball
Storage Gateway
EC2 Elastic Compute Cloud
Security Groups
EBS
EBS Volumes and Snapshots -
AMI Types (EBS vs. Instance Store)
ENI vs. ENA vs. EFA
Encrypted Root Device Volumes and Snapshots
Spot Instances and Spot Fleets
EC2 Hibernate
CloudWatch
CloudWatch
AWS Command Line (CLI)
Identity and Access Management Roles
Using Bootstrap Scripts
Instance Metadata
EFS
Amazon FSx for Windows and Amazon FSx for Lustre
EC2 Placement Groups
HPC on AWS
AWS WAF
Advanced IAM
AWS Directory Service
IAM Policies
Resource Access Manager (RAM)
AWS Single Sign-On
VPC Overview
VPC Concepts
Subnets
Address space
Internet Gateway
Route Table
NAT Instances and NAT Gateways
Network Access Control Lists vs. Security Groups - Demo
Custom VPCs and ELBs
VPC Flow Logs
AWS Direct Connect
Setting Up Direct Connect
Global Accelerator
VPC Endpoints
AWS PrivateLink
AWS Transit Gateway
AWS VPN CloudHub
AWS Network Costs
AWS Route 53
DNS
Register a Domain Name
Route 53 Routing Policies Available on AWS
Route 53: Simple Routing Policy
Route 53: Weighted Routing Policy
Route 53: Latency-Based Policy
Route 53: Failover Routing Policy
Route 53: Geolocation Routing Policy
Route 53: Geoproximity Routing Policy (Traffic Flow Only)
Route 53: Multivalue Answer Policy
HA Architecture
Elastic Load Balancer
Load Balancers and Health Checks
Advanced Load Balancer Theory
Auto Scaling
Launch Configurations and Auto Scaling Groups
Elastic Beanstalk
High Availability with Bastion Host
On-Premises Strategies with AWS
Databases
RDS Instance - Demo
RDS: Backups, Multi-AZ, and Read Replicas
DynamoDB
Advanced DynamoDB
Redshift
Aurora
Elasticache
Database Migration Service (DMS)
Caching Strategies on AWS
EMR Overview
AWS Architect Topics
Domain 1.0:
Designing highly available, cost-efficient, fault-tolerant, scalable systems 1.1 Identify and recognize cloud architecture
considerations, such as fundamental components and effective designs.
Content may include the following:
• How to design cloud services
• Planning and design
• Monitoring and logging
• Familiarity with: o Best practices for AWS architecture o Developing to client specifications, including pricing/cost
(e.g., on Demand vs. Reserved vs. Spot; RTO and RPO DR Design) o Architectural trade-off decisions (e.g., high
availability vs. cost, Amazon Relational Database Service (RDS) vs. installing your own database on Amazon Elastic
Compute Cloud (EC2)) o Hybrid IT architectures (e.g., Direct Connect, Storage Gateway, VPC, Directory Services) o
Elasticity and scalability (e.g., Auto Scaling, SQS, ELB, CloudFront)
Domain 2.0:
Implementation/Deployment 2.1 Identify the appropriate techniques and methods using Amazon EC2, Amazon S3,
AWS Elastic Beanstalk, AWS CloudFormation, AWS OpsWorks, Amazon Virtual Private Cloud (VPC), and AWS Identity
and Access Management (IAM) to code and implement a cloud solution.
Content may include the following:
• Configure an Amazon Machine Image (AMI)
• Operate and extend service management in a hybrid IT architecture
• Configure services to support compliance requirements in the cloud
• Launch instances across the AWS global infrastructure
• Configure IAM policies and best practices
Domain 3.0:
Data Security 3.1
Recognize and implement secure practices for optimum cloud deployment and maintenance. Content may include the
following:
• AWS shared responsibility model
• AWS platform compliance
• AWS security attributes (customer workloads down to physical layer)
• AWS administration and security services
• AWS Identity and Access Management (IAM)
• Amazon Virtual Private Cloud (VPC)
• AWS CloudTrail • Ingress vs. egress filtering, and which AWS services and features fit
• “Core” Amazon EC2 and S3 security feature sets
• Incorporating common conventional security products (Firewall, VPN)
• Design patterns
• DoS mitigation
• Encryption solutions (e.g., key services)
• Complex access controls (building sophisticated security groups, ACLs, etc.)
• Amazon CloudWatch for the security architect
• Trusted Advisor
• CloudWatch
Recognize critical disaster recovery techniques and their implementation. Content may include the following:
• Disaster recovery o Recovery time objective
o Recovery point objective
o Amazon Elastic Block Store
• AWS Import/Export
• AWS Storage Gateway
• Amazon Route53
• Validation of data recovery method
Domain 4.0:
Troubleshooting Content may include the following:
• General troubleshooting information and questions
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.