دات نت نیوک
Menu

دوره MCSE

 

دوره MCSE در مدارک جدید مایکروسافت کوتاه شده عبارت Microsoft Certified Solution Expert می باشد. مدرک MCSE جدیدترین مدرک برای متخصصین IT می باشد که شرکت مایکروسافت بجای مدرک MCITP ارائه کرده است. دوره اموزشی MCSE بر اساس ویندوز سرور 2012 طراحی شده که افراد پس از گذراندن این دوره می توانند مهارت لازم جهت طراحی شبکه کامپیوتری و مدیریت سیستم های مبتی بر ویندوز را بدست آورند. دوره MCSE برای افرادی مناسب است که می خواهند در زمینه تحلیل شبکه، مهندسی بخش فنی، مهندسی سیستم ها و … فعالیت داشته باشند.

دوره MCSE شامل 6 کورس می باشد. به افرادی که 4 کورس ابتدایی را با موفقیت به پایان برسانندمدرک MCSA تعلق خواهد گرفت و در صورتیکه 6 کورس را بصورت کامل طی کنند مدرک MCSE 2012 داده خواهد شد.در واقع MCSA بخشی از دوره MCSE می باشد.

تفاوت دوره MCSE با MCITP در این است که دوره MCSE بر اساس ویندوز سرور 2012 و MCITP بر اساس ویندوز سرور 2008 شکل گرفته است.

 

 

 

سرفصل دوره

 

 

نمایه محتوای آموزشی دوره

ردیف

سرفصل‌ها

ریزمحتوا

1

Introduction to Networks

  • Introduction to Networks:
  • An introduction to what a network is, and an overview of the most common physical network topologies you’ll find in today’s networks.
  • What’s a Network?
  • The Local Area Network (LAN)
  • Common Network Components
  • Internet / Intranet / Extranet
  • Virtual LANs (VLANs)
  • Wide Area Network (WAN)
  • Virtual Private Networks (VPNs)
  • Network Architecture: Peer-to-Peer or Client/Server?
  • Network Samples (Ethernet, Dial-up, DSL (Digital Subscriber Line), ISDN (Integrated Services Digital Network), Wireless)
  • Physical Network Topologies
  • Bus Topology
  • Star Topology
  • Ring Topology (Token ,FDDI)
  • Mesh Topology
  • Point-to-Point Topology
  • Point-to-Multipoint Topology
  • Hybrid Topology
  • Topology Selection, Backbones, and Segments
  • Selecting the Right Topology

2

The Open Systems Interconnection Specifications:

  • The Open Systems Interconnection Specifications:
  • OSI model, what it is, what happens at each of its layers, and how each layer works.
  • Internetworking Models
  • The Layered Approach
  • Advantages of Reference Models
  • The OSI Reference Model
  • The Application Layer (Data,…)
  • The Presentation Layer (Data,…)
  • The Session Layer (Data,…)
  • The Transport Layer (Segment,..)
  • The Network Layer (Packet,…)
  • The Data Link Layer (Frame, …)
  • The Physical Layer (Signal, Voltage,..)
  • Introduction to Encapsulation

3

 

Networking Topologies, Connectors, and Wiring Standards:

  • Networking Topologies, Connectors, and Wiring Standards:
  • covers the various networking media and topologies, plus the cable types and properties used in today’s networks.
  • Physical Media (Advantages and Disadvantage)
  • Coaxial Cable
  • Twisted-Pair Cable (Categories)
  • Fiber-Optic Cable (single mode /multimode)
  • Serial Cables
  • Connectors (RJ11 ,Rj45, RG-58, RG-59, RG-6, Fiber connectors, USB connector type, firewire IEEE 1394,)
  • Properties of Cables
  • Transmission Speeds
  • Duplex (full, half)
  • Noise Immunity (Security, EMI)
  • Frequency
  • Wiring Standards
  • 568A 568B
  • Straight-Through Cable
  • Crossover Cable
  • Rollover Cable
  • Hardware Loopback
  • Installing Wiring Distributions
  • Vertical and Horizontal Cross-Connects
  • Patch Panels
  • Verifying Correct Wiring Installation
  • Verifying Proper Wiring Termination

4

 

The Current Ethernet Specifications

  • The Current Ethernet Specifications:
  • covers how a basic Ethernet LAN works, and describes and categorizes the different Ethernet specifications.
  • Network Basics
  • Ethernet Basics
  • Collision Domain
  • Broadcast Domain
  • MAC Address
  • Half- and Full-Duplex Ethernet
  • Ethernet at the Data Link Layer
  • Binary to Decimal and Hexadecimal Conversion
  • Ethernet Addressing
  • Ethernet Frames
  • Channel Bonding
  • Ethernet at the Physical Layer

5

 

Networking Devices

  • Networking Devices:
  • understanding all the various devices used in today’s networks, and this chapter will describe how hubs, routers, and switches and some other devices work within a network.
  • Common Network Connectivity Devices (Which of the following devices work at same or different collision domain/broadcast domain)
  • Modem
  • Network Interface Card (NIC)
  • Transceiver (Media Converter)
  • Bridge
  • Switch
  • Wireless Access Point (AP)
  • Router
  • Firewall
  • Dynamic Host Configuration Protocol (DHCP) Server
  • Other Specialized Devices
  • Multilayer Switch
  • Content Switch
  • Intrusion Detection or Prevention System (IDS/IPS)
  • Load Balancer
  • Multifunction Network Devices
  • Domain Name Service (DNS) Server
  • Bandwidth Shaper
  • Proxy Server
  • Channel Service Unit/Data Service Unit (CSU/DSU)
  • Network Segmentation
  • Switches and Bridges at the Data Link Layer
  • Hubs at the Physical Layer

6

Introduction to Internet Protocol (IP)

  • Introduction to Internet Protocol (IP):
  • This is your introduction to the all-important IP protocol stack.
  • Introducing TCP/IP
  • A Brief History of TCP/IP (ARPA, …)
  • TCP/IP (OSI) and the DoD Model
  • The Process/Application Layer Protocols (Telnet, FTP, SFTP, TFTP, NFS, SMTP,POP ,IMAP 4,SSL , SIP(VoIP, RIP (VoIP), LDP, SNMP, SSH, HTTP, HTTPS ,NTP, NNTP ,SCP ,LDAP ,IGMP , LPR, DNS, DHCP, BootP )
  • The Host-to-Host Layer Protocols (TCP ,UDP, Well Known Ports for common Internet / Network services)
  • The Internet Layer Protocols (IP, ICMP,ARP, RARP, Proxy ARP)
  • Data Encapsulation
  • Supporting TCP/IP (TCP/IP Configuration Parameters)
  • How to set Static IP Address/ Automatic / Alternate /APIPA TCP-IP Configuration, Configuring a DNS Client

7

IP Addressing

  • IP Addressing:
  • This chapter will take up from where Chapter 6 left off and move into IP addressing. It also contains information about public versus private addressing and DHCP.
  • IP Terminology (Network Address, Broadcast,…)
  • The Hierarchical IP Addressing Scheme
  • Network Addressing
  • Private IP Addresses (Class A/B/C/D/E - APIPA)
  • Broadcast / Multicast /Unicast
  • Internet Protocol Version 6 (IPv6)
  • Why Do We Need IPv6?
  • The Benefits of and Uses for IPv6
  • IPv6 Addressing and Expressions
  • Shortened Expression
  • Address Types
  • Special Addresses

8

IP Subnetting Troubleshooting IP, And Introduction to NAT

  • IP Subnetting Troubleshooting IP, And Introduction to NAT: overlap with exam: 70-291
  • Beginning where Chapter 7 ends, we’ll be tackling IP subnetting in this one.
  • Subnetting Basics
  • How to Create Subnets
  • Subnet Masks
  • Classless Inter-Domain Routing (CIDR)
  • Subnetting Class C Addresses
  • Subnetting Class B Addresses
  • Troubleshooting IP Addressing
  • Determining IP Address Problems
  • Introduction to Network Address Translation (NAT)
  • Types of Network Address Translation
  • Static NAT (SNAT) ,Dynamic NAT, Overloading
  • one-to-one , IP Address pool, many-to-one
  • How NAT Works
  • ICS (Internet Connection Sharing)
  • Differences between ICS and NAT

9

Introduction to IP Routing

  • Introduction to IP Routing:
  • This is an introduction to routing that basically covers what routers do and how they do it. This chapter, along with Chapters 10 and 11, cover routing and switching in much more detail than what is necessary to meet the CompTIA Network+ objectives, because this knowledge is so critical to grasp when working with today’s networks.
  • Routing Basics
  • The IP Routing Process
  • Testing Your IP Routing Understanding (Packet Tracer LAB or other LAB)
  • Static and Dynamic Routing (RGIP, EIGRP, OSPF,…)

10

Routing Protocols

  • Routing Protocols:
  • This chapter goes into detail describing the protocols that run on routers and that update routing tables to create a working map of the network.
  • Routing Protocol Basics
  • Administrative Distances (AD)
  • Classes of Routing Protocols (Distance vector, Link state ,Hybrid)
  • Distance-Vector Routing Protocols
  • Routing Information Protocol (RIP)
  • RIP Version 2 (RIPv2)
  • VLSM and Discontiguous Networks
  • Border Gateway Protocol (BGP)
  • Link-State Routing Protocols
  • Open Shortest Path First (OSPF)
  • Intermediate System to Intermediate System (IS-IS)
  • IPv6 Routing Protocols

11

Switching and Virtual LANs (VLANs)

  • Switching and Virtual LANs (VLANs):
  • This chapter covers Layer 2 switching, the Spanning Tree Protocol (STP), and Virtual LANs. This chapter has deeper information needed for the exam, this chapter cover switching and virtual LANs (which are also vital in today’s corporate networks) more thoroughly as well.
  • Switching Services
  • Limitations of Layer 2 Switching
  • Bridging vs. LAN Switching
  • Three Switch Functions at Layer 2 (Address Learning, Forward/Filter Decisions, Loop Avoidance)
  • Spanning Tree Protocol (STP)
  • Spanning-Tree Port States
  • STP Convergence
  • Virtual LANs (VLANs)
  • VLAN Basics
  • VLAN Memberships
  • Static VLANs
  • Dynamic VLANs
  • Identifying VLANs
  • VLAN Identification Methods
  • Switching and Network Security
  • Port Security/Authentication
  • How VLANs Enhance Network Security
  • Two Additional Advanced Features of Switches
  • Power over Ethernet (PoE)
  • Port Mirroring/Spanning

12

Wireless Technologies

  • Wireless Technologies:
  • Because wireless is so important for both home and business networks today, this chapter is loaded with all the information you need to be successful at wireless networking at home and work.
  • Introduction to Wireless Technology
  • The 802.11 Standards
  • 2.4GHz (802.11b)
  • 2.4GHz (802.11g)
  • 5GHz (802.11a)
  • 5GHz (802.11h)
  • 2.4GHz/5GHz (802.11n)
  • Comparing 802.11 Standards
  • Wireless LAN Modulation Techniques
  • Range Comparisons
  • Wireless Network Components
  • Wireless Access Points
  • Wireless Network Interface Card (NIC)
  • Wireless Antennas
  • Installing a Wireless Network
  • Ad hoc Mode: Independent Basic Service Set (IBSS)
  • Infrastructure Mode: Basic Service Set (BSS)
  • Design Considerations with Large Wireless Networks
  • Installing and Configuring Hardware
  • Wireless Securityoverlap with exams: 70-291, 70-293, 70-298 ,70-299
  • Open Access
  • Service Set Identifiers (SSIDs), Wired Equivalent
  • Privacy (WEP), and Media Access Control (MAC)
  • Address Authentication
  • Remote Authentication Dial In User Service (RADIUS)
  • Temporal Key Integrity Protocol (TKIP)
  • Wi-Fi Protected Access (WPA) or WPA 2 Pre-Shared Key

13

Authentication and Access Control

  • Authentication and Access Control:
  • This is the first of three security chapters. There are tons of exam objectives about network security that are so important that I took three chapters to cover all of them. In this chapter, I’ll introduce security, security filtering, tunneling, and user authentication.
  • Security Filtering
  • Access Control Lists overlap with all70-XXX exams
  • Remote Access Protocol & Tunneling (Tunneling modes):(SLIP, PPP, PPOE, PPTP,L2TP,IPSEC) overlap with exams: 70-291, 70-293, 70-298 ,70-299
  • Encryption overlap with exams: 70-291, 70-293, 70-298 ,70-299
  • Private Encryption Keys
  • Data Encryption Standard (DES)
  • Triple Data Encryption Standard (3DES)
  • Advanced Encryption Standard (AES)
  • Public Key Encryption
  • RSA Data Security
  • Pretty Good Privacy (PGP)
  • Remote Access (RAS,RDP,PPP, PPPoE)
  • Managing User Account and Password Security overlap with exam: 70-290
  • Network Resource-Sharing Security Models (Share-Level Security or User-Level Security)
  • Managing User Accounts (Disabling Accounts,Setting Up Anonymous Accounts ,Limiting Connections, Renaming the Maintenance Account)
  • Managing Passwords (Minimum Length, Using Characters to Make a Strong Password, Automatic Account Lockouts, Password Expiration and Password Histories)
  • User-Authentication Methods overlap with exams: 70-298, 70-299
  • Public Key Infrastructure (PKI)
  • Kerberos
  • Authentication, Authorization, and Accounting (AAA)
  • Network Access Control (NAC)
  • Challenge Handshake Authentication Protocol (CHAP)
  • MS-CHAP
  • Authentication Protocol (EAP)

14

Network Threats and Mitigation

  • Network Threats and Mitigation
  • This chapter tell you all about security threats and how to stop them. The only way to get good at network security is to implement it, and this chapter shows you how.
  • Recognizing Security Threats
  • Denial of Service (DoS)
  •  
  • Worms
  • Attackers and Their Tools
  • Rogue Access Points
  • Social Engineering (Phishing)
  • Understanding Mitigation Techniques
  • Active Detection
  • Passive Detection
  • Proactive Defense
  • Policies and Procedures
  • Security Policies
  • Security Training
  • Patches and Upgrades
  • Updating Antivirus Components
  • Fixing an Infected Computer

15

Physical and Hardware Security

  • Physical and Hardware Security:
  • This chapter’s focus is on explaining basic firewalls, security devices, and device security.
  • Using Hardware and Software Security Devices
  • Defining Firewalls
  • Network-Based Firewalls
  • Host-Based Firewalls
  • Firewall Technologies
  • Access Control Lists (ACL)
  • Demilitarized Zone (DMZ)
  • Protocol Switching
  • Dynamic Packet Filtering
  • Proxy Services
  • Firewalls at the Application Layer vs. the Network Layer
  • Stateful vs. Stateless Network-Layer Firewalls
  • Application-layer Firewalls
  • Scanning Services and Other Firewall Features
  • Content Filtering
  • Signature Identification
  • Zones (Internet Explorer)
  • Intrusion-Detection and -Prevention Systems
  • Network-Based IDS
  • Host-Based IDS
  • VPN Concentrators
  • Understanding Problems Affecting Device Security
  • Physical Security
  • Secure and Unsecure Application Protocols

16

Wide Area Networks

  • Wide Area Networks:
  • In this chapter, you get to learn all about things like frame relay, E1/T1, DSL, cable modems, and more. All the CompTIA Network+ WAN objectives are covered in this chapter.
  • What’s a WAN
  • Defining WAN Terms
  • The Public Switched Telephone Network (PSTN)
  • WAN Connection Types (Frame relay ,E1/T1,ADSL ,SDSL ,VDSL ,Cable modem, Satellite, E3/T3 ,OC-x, Wireless, ATM, SONET, MPLS, ISDN BRI, ISDN PRI, POTS, PSTN)
  • Bandwidth or Speed
  • T-Series Connections
  • The T1 Connection
  • The T3 Connection
  • Transmission Media
  • Wired Connections
  • Wireless Technologies
  • Broadband Services
  • DSL Technology and xDSL
  • Cable Modem
  • WAN Protocols
  • Integrated Services Digital Network (ISDN)
  • Frame Relay Technology
  • Asynchronous Transfer Mode (ATM)
  • Multi Protocol Label Switching (MPLS)

17

Command-Line Tools

  • Command-Line Tools:
  • in this chapter you can follow along and run all the commands yourself.
  • Tracert (Traceroute)
  • ipconfig/winipcfg (ifconfig inLinux/Unix/Mac)
  • Nslookup (dig in linux)
  • Hostname (Host Table Files)
  • Pathping (mtr in Linux or Unix)
  • FTP (downloading and uploading files)
  • Telnet /SSH

18

Software and Hardware Tools

  • Software and Hardware Tools:
  • This chapter introduces you to the network tools you will use to help you run your networks. Both software and hardware tools will be discussed.
  • Understanding Network Scanners
  • Packet Sniffers (Microsoft’s Network Monitor (NetMon))
  • Wireless scanner (AirSnort ,netstumbler,…)
  • Intrusion Detection and Prevention Software (IDS/IPS)
  • Port Scanners
  • Identifying Hardware Tools
  • Cable Testers
  • Protocol Analyzer
  • Certifiers
  • Time-Domain Reflectometer (TDR)
  • Optical Time-Domain Reflectometer (OTDR)
  • Multimeter
  • Toner Probe (tone generator)
  • Butt Set
  • Punch-Down Tool
  • Cable Stripper/Snips/crimper
  • Voltage Event Recorder
  • Temperature Monitor

19

Network Troubleshooting

  • Network Troubleshooting:
  • in this chapter discussing how to verify and fix problems, but this chapter will get really into the nuts and bolts of detailed network troubleshooting and documentation.
  • implement the following network troubleshooting methodology
  • Information gathering—identify symptoms and problems
  • Identify the affected areas of the network
  • Determine if anything has changed
  • Establish the most probable cause
  • Determine if escalation is necessary
  • Create an action plan and solution identifying
  • potential effects
  • Implement and test the solution
  • Identify the results and effects of the solution
  • Document the solution and the entire process
  • Troubleshoot common connectivity issues and select an appropriate solution
  • Physical issues:
  • Cross talk
  • Nearing cross talk
  • Open impedance mismatch (echo)
  • Logical issues:
  • Port speed
  • Port duplex mismatch
  • Incorrect VLAN
  • Incorrect IP address
  • Wrong gateway
  • Wrong DNS
  • Wrong subnet mask
  • Issues that should be identified but escalated:
  • Switching loop
  • Routing loop
  • Route problems
  • Proxy arp
  • Broadcast storms
  • Wireless Issues:
  • Interference (bleed, environmental factors)
  • Incorrect encryption
  • Incorrect channel
  • Incorrect frequency
  • ESSID mismatch
  • Standard mismatch (802.11 a/b/g/n)
  • Incorrect antenna placement

20

Prerequisites

 

  • Prerequisites:
  • This Course requires that students meet the following prerequisites:
  • Have a working knowledge of the Windows XP operating system
  • Have a basic understanding of computer hardware
  • Have a basic understanding of networking technologies
  • After this Course, you will be able to:
  • Identifying Major Features of Windows XP
  • Installing Windows XP Professional
  • Implementing and managing resources
  • Installing, managing, and troubleshooting hardware devices and drivers
  • Monitoring and optimizing system performance and reliability
  • Configuring and troubleshooting the desktop environment
  • Implementing, managing, and troubleshooting network protocols and services

21

Introduction to Windows XP Professional

  • Introduction to Windows XP Professional:
  • Available Windows XP Editions,
  • Major Enhancements Included in Windows XP Service Pack 2&3,
  • Identifying Key Characteristics of Workgroups and Domains, Log On Locally or domain

22

Installing & Deploying Windows XP Professional

  • Installing & Deploying Windows XP Professional:
  • Preparing for Installation & Verify Hardware Compatibility with the Windows Catalog
  • Guidelines for Choosing a File System
  • Unattended installation (Winnt.sif) ,
  • Network base installation (winnt.exe & winnt32.exe)
  • disk duplication (Sysprep.exe)
  • Remote Installation Services (RIS)(remboot.sif & reprep.exe)
  • How to Upgrade Compatible Computers running win 98/NT4.0 ,
  • Troubleshooting Windows XP Professional Setup, Use the Files And Settings Transfer Wizard and User State Migration Tool

23

Modifying and Troubleshooting the Startup Process

  • Modifying and Troubleshooting the Startup Process:
  • What Happens During the Preboot Sequence(Boot Sequence)
  • What Is the BOOT.INI?
  • What Is the Registry? The Hierarchical Structure of the Registry, How to View and Edit the Registry Using the Registry Editor.
  • Troubleshooting Problems Using Startup and Recovery Tools
  • Troubleshooting Startup Using Safe Mode or Last Known Good Configuration,
  • Additional Advanced Boot Options,
  • How to Perform Troubleshooting and Recovery Tasks Using the Recovery Console

24

Configuring Windows XP Professional

  • Configuring Windows XP Professional:
  • Display and Desktop Properties
  • Power Options, Select a Power Scheme,
  • Enabling Hibernate Mode
  • Configure Environment Variables
  • Configuring Multiple Languages by Using Control Panel,
  • How to Add Windows Components
  • How to Manage Internet Information Services

25

Installing, Managing, and Troubleshooting Hardware Devices and Drivers

  • Installing, Managing, and Troubleshooting Hardware Devices and Drivers:
  • How to Install Hardware Automatically (P&P) or manually
  • Disabling and Re-enabling a Hardware Device, Viewing and Configuring Hardware Profiles ,
  • Configuring and Troubleshooting Hardware Devices

26

Setting Up and Managing User Accounts

  • Setting Up and Managing User Accounts:
  • Differences between Type of User Account (Local, Domain, Built-in, …)
  • Creating and Managing User Objects (Add, Remove, Disable, Rest Password, …)
  • RunAs characteristic
  • Password Reset Disk
  • User Profiles Type (Local , Roaming, Mandatory, …)
  • Implementing Groups (Advantages of grouping users)

27

Securing Resources with NTFS Permissions

  • Securing Resources with NTFS Permissions:
  • Standard/Advances NTFS Files/Folder Permissions
  • Calculating effective permission
  • How to replace & inheritance NTFS Permission, Grant or Deny/Assign or Modify Permissions
  • Taking ownership of the file and folder
  • Effective NTFS permission When Files and Folders Are Copied or move,
  • Troubleshooting Common Permissions Problems

28

Administering Shared Folders

  • Administering Shared Folders:
  • Simple/Advance file Sharing
  • Shared Folder Permissions
  • Requirements for Sharing a Folder (User right has needed)
  • Create Multiple Share Names for a Shared Folder,
  • Administrative Shares,
  • ManagingShared Folders by Using Computer Management
  • Combination Shared Folder Permissions and NTFS Permissions Rules

29

Managing Data Storage

  • Managing Data Storage:
  • Differences between Basic and Dynamic Disks
  • Implementing Mirror, strip, Spend Extended ,… Volume
  • Manage Disks Remotely (Computer Management) or by Command line (diskpart)
  • How to Compress Files, Folders, or Volumes by Using NTFS Compression
  • Managing and monitoring Disk Quotas,
  • Increasing Security by Using EFS GUI or Cipher command
  • EFS Recover Agent
  • Defragment Disks, Scan disk, Disk Cleanup,
  • Configuring Offline Folders and Files

30

Setting Up, Configuring, and Troubleshooting Printers

  • Setting Up, Configuring, and Troubleshooting Printers
  • Requirements & Guidelines for Developing for Network Printing Strategy
  • How to Add and Share a Local Printer or Network interface printer
  • Adding an LPR Port or TCP/IP Port
  • Connecting Directly to a Shared Printer or Using a Web Browser (Internet Printing by IIS component)
  • How to Install Additional Printer Drivers
  • Create a Printer Pool, Possible Troubleshooting Solutions for Common printer issue.

31

Managing Printers and Documents

  • Managing Printers and Documents
  • How to set Print Permissions,
  • How to Set Up a Separator Page
  • Pause a Printer and Cancel Documents
  • Redirect Documents to a Different Printer,
  • Configure Spooling Options
  • Take Ownership of a Printer
  • Administering Printers by Using a Web Browser
  • Troubleshooting Common Printing Problems

32

Supporting TCP/IP (TCP/IP Configuration Parameters)

  • Supporting TCP/IP (TCP/IP Configuration Parameters)
  • How to set Static IP Address/ Automatic / Alternate /APIPA TCP-IP Configuration
  • TCP/IP Tools to Troubleshooting a connection (ping, netview, Ttracert, Ipconfig, pathping...),
  • Overview of Name Resolution DNS Domain Name, Zone, NetbBios name, WINS
  • Configuring a DNS Client.
  • TCP/IP Connection Filtering

33

Overview of Active Directory Service (Optional chapter)

  • Overview of Active Directory Service ( Optional chapter) overlap with exam: 70-290

34

Configuring Network and Internet Connections

  • Configuring Network and Internet Connections
  • How to Install, Disable, and Uninstall Network Components
  • How to bridge and repair a network connection,
  • The New Connection Wizard, Configuring dial-up/VPN connection,
  • How to Specify Callback and Multilink connection
  • Configuring Incoming Dial-Up/VPN Connections
  • Configuring Wireless Networking (differences between Ad-hoc/infrastructure and Review SSID, MAC Filtering, WEP, WPA, Preferred Network List Configuring)
  • Internet Connection Sharing (ICS), ICS Limitation,
  • How to Enable or Disable Windows Firewall for all Network Connections or Specific network connection
  • advanced Windows Firewall options, Windows Firewall Logging, creating Windows Firewall exceptions, ICMP exception type,

35

Configuring Security Settings and Internet Options

  • Configuring Security Settings and Internet Options
  • How to Modify Local Security Policy,
  • How to Modify Security Templates,
  • How to Customize a Predefined Security Template,
  • How to Apply a Security Template ,
  • How to View Policies That Are in Effect On a Computer ,
  • Security Setting Commands: Resultant Set of Policy (RSoP), Gpresult,
  • Security & Configuration Analysis
  • Configuring Account Policy (Password Policy, Lockout policy)
  • Configuring User Rights,
  • Security Option,
  • Implementing an Audit Policy
  • Configuring Internet Explorer Options

36

Monitoring and Managing Shared Folders by Using Computer Management

  • Monitoring and Managing Shared Folders by Using Computer Management.
  • Using the Shares Folder to View, Monitor, create and stop Shared Folders,
  • Monitoring network User Sessions
  • How to Disconnect Users
  • Send Administrative Messages to Users

37

Using Windows XP Tools

  • Using Windows XP Tools
  • Using the Services Console
  • Changing the Recovery Options for a Service,
  • Determine Service Dependency
  • Disable and Enable Services by Using MSConfing or SC.exe Command ,
  • Using Event Viewer (view ,Save, open)
  • Type of Event (security, Application, System, …)
  • Using Scheduled Tasks,
  • Using System Restore (Enabling /Disabling),
  • Using Remote Desktop and Remote Assistance

38

Monitoring and Optimizing System Performance

  • Monitoring and Optimizing System Performance
  • Using Task Manager (process, Performance, Change the Base Priority of a Running Process, Set Processor Affinity, how to view network utilization)
  • Using the system monitor (Object/instance/counter)
  • Use Performance Logs And Alerts
  • How to Identify and Resolve Bottlenecks

39

Backing Up and Restoring Data

  • Backing Up and Restoring Data
  • Backup Or Restore Wizard or Advanced mode,
  • Back Up and Restore Data User right,
  • How to Plan a Backup strategy (Determine What to Back Up, How often, Which Target Media, Network or Local Backup Job,)
  • Type of Backup (Normal, Copy, Incremental, Differential, Daily),
  • Combination of Backup Types
  • How to Change Default Backup Options,
  • Scheduling Backup Jobs
  • Advanced Restore Settings (Restore Files To, Leave Existing or Replace,…)

40

References

  • Installing, configuring and Administering Microsoft Windows XP Professional (70-270) Self-paced Training kit , Microsoft Press,Second Edition, Walter Glenn &Tony Northrup
  • Configuring and Troubleshooting Windows XP Proffesional , SYNGRESS , (Brian Barber , Chad Todd , Norris L. Johnson, Jr. , Robert J. Shimonski , Martin Grasdal)

41

Active Directory Overview

  • Active Directory Overview
  • Physical structure & logical Structure, Object, Schema, Domain, Tree, Forest, OU, GC, DC, Site, DN ,RDN)

42

Introducing Microsoft Windows Server 2003 & Installation and Configuration of Windows Server 2003

  • Introducing Microsoft Windows Server 2003 & Installation and Configuration of Windows Server 2003
  • Windows Server 2003 Editions
  • Installing and Configuring Windows Server 2003

43

Administering Microsoft Windows Server 2003

  • Administering Microsoft Windows Server 2003:
  • MMC Consoles (Snap-in, Author & User mode, connecting to Remote Computer by MMC console)
  • Remote desktop (Firewall Configuration, User Right) overlap with exam: 70-270
  • Remote Assistance overlap with exam: 70-270
  • Terminal Service (Terminal Services Configuration (RDP-TCP Connection Properties) , Monitoring, Administration)

44

User Accounts

  • User Accounts:
  • Type of User Account, overlap with exam: 70-270
  • Creating and Managing User Objects, Disabling, Enabling, Renaming, and Deleting User Objects overlap with exam: 70-270
  • User Profiles Type overlap with exam: 70-270
  • Unlocking a User Account
  • Resetting User Passwords overlap with exam: 70-
  • Modifying Account Expiration
  • Changing or Removing Computer Restrictions
  • Granting the User Right to Log On Locally
  • Managing User Logon Hours
  • Preventing Users from Logging On with Cached Credentials

45

Group Accounts

  • Group Accounts:
  • Understanding Group Types and Scopes (Local, Domain Local, Global, Unversal)
  • Group Conversion
  • Special Identities (Groups)
  • Managing Group Accounts with GUI overlap with exam: 70-270
  • Using Automation to Manage Group Accounts (Command Base: Csvde, Ldifde, Dsadd, … )

46

Computer Accounts

  • Computer Accounts:
  • Joining a Computer to a Domain
  • Creating Computer Accounts
  • Creating Computer Objects Using Active Directory Users and Computers
  • Creating Computer Objects Using Dsadd
  • Creating a Computer Account with Netdom
  • Configuring Computer Properties
  • Troubleshooting Computer Accounts
  • Deleting and Disabling and Resetting Computer Accounts
  • Recognizing Computer Account Problems

47

Files and Folders

  • Files and Folders:
  • Standard/Advances NTFS Files/Folder Permissions overlap with exam: 70-270
  • Calculating effective permission overlap with exam: 70-270
  • How to replace & inheritance NTFS Permission, Grant or Deny/Assign or Modify Permissions overlap with exam: 70-270
  • Taking ownership of the file and folder overlap with exam: 70-270
  • Effective NTFS permission When Files and Folders Are Copied or move, overlap with exam: 70-270
  • Troubleshooting Common Permissions Problems overlap with exam: 70-270
  • Simple/Advance file Sharing overlap with exam: 70-270
  • Shared Folder Permissions overlap with exam: 70-270
  • Requirements for Sharing a Folder (User right has needed) overlap with exam: 70-270
  • Create Multiple Share Names for a Shared Folder, overlap with exam: 70-270
  • Administrative Shares, overlap with exam: 70-270
  • ManagingShared Folders by Using Computer Management overlap with exam: 70-270
  • Combination Shared Folder Permissions and NTFS Permissions Rules overlap with exam: 70-270
  • Administering Internet Information Services
  • Installing IIS 6.0 Component
  • Administering the Web Environment
  • Configuring and Managing Web and FTP Sites
  • Securing Files on IIS (Web Authentication Options, FTP Authentication Options, Defining Resource Access with Permissions)

48

Backing Up Data

  • Backing Up Data:
  • Fundamentals of Backup and Performing Different Backup Types ,Backup & Restore Option, Ntbackup Command, Scheduling Backup Jobs, overlap with exam: 70-270
  • Shadow Copies of Shared Folders

49

Printers

  • Printers: overlap with exam: 70-270
  • Printer Pool,
  • Configuring Multiple Logical Printers for a Single Printer,
  • Internet Printing,
  • Maintaining Printers and Monitoring Printers,
  • Create Printer Users Groups and Assign Permissions to the Printers

50

Maintaining the Operating System

  • Maintaining the Operating System:
  • Understanding SUS/WSUS,
  • Designing a SUS/WSUS Infrastructure,
  • configuring Automatic Updates Client manually or with GPO,
  • Service Packs
  • Administering Software Licenses
  • Obtaining a Client Access License
  • Per-Server Licensing
  • Per-Device or Per-User Licensing
  • Administering Site Licenses
  • License Groups

51

Managing Hardware Devices and Drivers

  • Managing Hardware Devices and Drivers:overlap with exam: 70-270
  • Using Device Manager,
  • Driver Signing Options
  • Rolling Back Drivers,
  • Disabling and Enabling Devices, Troubleshooting Hardware Devices and Drivers)

52

Managing Microsoft Windows Server 2003 Disk Storage

  • Managing Microsoft Windows Server 2003 Disk Storage:
  • Differences between Basic and Dynamic Disks, overlap with exam: 70-270
  • Disk Management, overlap with exam: 70-270
  • Converting Disk Storage, overlap with exam: 70-270
  • Implementing and troubleshooting Software RAID (Mirror , Stripe, RAID 5, Span; Remove/Delete/Break)
  • Disk Defragmenter, Disk Quotas overlap with exam: 70-270
  • Performing Disk Management Tasks from the Command Prompt (convert, FSutil, Mountvol, chkdsk, Diskpart)

53

Monitoring Microsoft Windows Server 2003

  • Monitoring Microsoft Windows Server 2003:
  • Using Event Viewer,
  • Performance Console, overlap with exam: 70-270
  • Task Manager, overlap with exam: 70-270
  • WMI Event Logging Provider

54

Recovering from System Failure

  • Recovering from System Failure:
  • A Review of Recovery Options,
  • System State backup
  • Automated System Recovery (ASR) overlap with exam: 70-270

55

EXAM

 

 

برای رزرو کلاس مورد نظر اینجا کلیک کنید