Archive for 2013
MCSE TRAINING IN VELLORE
MCSE 2012 Training
Redback Solutions is now
offering the latest Microsoft Certified Solutions Expert 2012 training to keep
you ahead of the times. The MCSE 2012 course helps you build essential skills
required to manage modern datacenters and IT environments. The new
certifications in MCSE assist professionals to work efficiently in complex
technological environments and validates their capability in doing so.
What's New in MCSE
2012
- The MCSE 2012 introduces two new specializations:
- Desktop Infrastructure : This MCSE 2012 training and certification offers
expertise on desktop maintenance skills such as deployment and management
of desktops and devices, in a flexible and reliable environment. It
allows you to be the master of desktop and application virtualization,
and remote desktop solutions while also maintaining compliance and
security.
- Server Infrastructure : This MCSE 2012 course makes you proficient in handling
highly sophisticated data centers including their design, build, storage,
virtualization, networking and systems management. This advanced
certification from Redback Solutions empowers IT professionals to go
beyond plain virtualization skills to help them deliver powerful
solutions for data center management.
The MCSE 2012 certification can prove to be a
differentiator in recruiting decisions made by IT organizations worldwide. With
a globally recognized and coveted certification like this, you are sure to make
a head start in your IT career by leaps and bounds.
CCNA TRAINING IN VELLORE
CCNA
Course Contents and CCNA Course fees in Vellore
Best CCNA training in Chennai
using real Routers and Switches for a training fees of Rs. 5000/- only!
No Simulators or Emulators!
Assured Quality!! Rush now.. Limited period offer!!!
CCNA Training Course Contents
Part I - Basics of Networking
Basic Definitions
• What is a Computer Network?
• Local Area Network (LAN)
• Wide Area Network (WAN)
• Internet, Intranet, Extranet
• Peer-to-Peer Networks and Client-Server Networks
• Local Area Network (LAN)
• Wide Area Network (WAN)
• Internet, Intranet, Extranet
• Peer-to-Peer Networks and Client-Server Networks
Network Topologies
• Bus Topology
• Star Topology
• Extended Star Topology
• Ring Topology
• Mesh Topology
• Hybrid Topology
• Star Topology
• Extended Star Topology
• Ring Topology
• Mesh Topology
• Hybrid Topology
Networking Media and Connectors
• Co-axial Cable
• Twisted Pairs(STP,UTP)
• Wiring Scheme
• EIA/TIA-568A/568B Standards
• Straight-Through and Cross Over Cables
• Crimping Straight-Through and Cross Over cables - Practical Labs
• Networking Media Standards
• Twisted Pairs(STP,UTP)
• Wiring Scheme
• EIA/TIA-568A/568B Standards
• Straight-Through and Cross Over Cables
• Crimping Straight-Through and Cross Over cables - Practical Labs
• Networking Media Standards
LAN Technologies – Ethernet
• IEEE 802 Standards
• IEEE 802.3 Standards
• LAN Hubs and Switches
• How Switches operate
• Collision Domain and Broadcast Domain
• Access Methods
• CSMA/CD
• CSMA/CA
• Token Passing
• IEEE 802.3 Standards
• LAN Hubs and Switches
• How Switches operate
• Collision Domain and Broadcast Domain
• Access Methods
• CSMA/CD
• CSMA/CA
• Token Passing
Networks Protocols
• What are Routable and Non-Routable Network Protocols?
• Brief Discussion about proprietary network protocols
• NetBEUI
• IPX/SPX
• AppleTalk
• What are Routable and Non-Routable Network Protocols?
• Brief Discussion about proprietary network protocols
• NetBEUI
• IPX/SPX
• AppleTalk
Part II - Introduction to TCP/IP
- Industry Standard Network Protocol
Basic Terms
• Request for Comments (RFC)
• The OSI reference model
• Seven Layers of OSI Models and the functions of each layer
• TCP/IP network model
• Comparison between TCP/IP and OSI models
• Host-to-Host Communication model
• Encapsulation and Decapsulation
• Data Packets at different layers of OSI reference model
• Brief explanation of different protocols at each layer
• Closer look at TCP/IP data communication
• The OSI reference model
• Seven Layers of OSI Models and the functions of each layer
• TCP/IP network model
• Comparison between TCP/IP and OSI models
• Host-to-Host Communication model
• Encapsulation and Decapsulation
• Data Packets at different layers of OSI reference model
• Brief explanation of different protocols at each layer
• Closer look at TCP/IP data communication
OSI Reference model – Layer 2
• Introduction to Layer 2 (Data link
Layer)
• Brief discussion about different Layer 2 Standards
• More about Ethernet
• Ethernet Frame format
• Different fields in an Ethernet Frame and explanation
• Introduction to Layer 2 Addresses (MAC Addresses)
• Binary/Decimal/Hexadecimal number systems
• Binary/Decimal/Hexadecimal conversions
• Structure of MAC Addresses
• Three modes of network communication Unicast, Multicast and Broadcast
• Unicast/Multicast/Broadcast MAC Addresses
• Brief discussion about different Layer 2 Standards
• More about Ethernet
• Ethernet Frame format
• Different fields in an Ethernet Frame and explanation
• Introduction to Layer 2 Addresses (MAC Addresses)
• Binary/Decimal/Hexadecimal number systems
• Binary/Decimal/Hexadecimal conversions
• Structure of MAC Addresses
• Three modes of network communication Unicast, Multicast and Broadcast
• Unicast/Multicast/Broadcast MAC Addresses
OSI Reference Model – Layer 3
• Introduction to Layer 3 (Network
Layer)
• Brief discussion about different Layer 3 Protocols
• Introduction to Internet Protocol Version 4(IPv4)
• IP Header and different fields in IPv4 Header
• Introduction to Layer 3 Addresses (IPv4 Addresses)
• Wireshark Analysis of IPv4 Traffic
• Brief discussion about different Layer 3 Protocols
• Introduction to Internet Protocol Version 4(IPv4)
• IP Header and different fields in IPv4 Header
• Introduction to Layer 3 Addresses (IPv4 Addresses)
• Wireshark Analysis of IPv4 Traffic
IP Addresses, Subnetting and Route
Summarization/Supernetting
• Class A, B, C, D and E IP Addresses
• Network part and Host part in an IP Address
• What is subnet mask and why we need subnet mask
• CIDR Numbers
• Introduction to Subnetting
• Class A, Class B and Class C Subnetting
• Variable Length Subnet Masking (VLSM)
• Route Summarization/Supernetting
• Network part and Host part in an IP Address
• What is subnet mask and why we need subnet mask
• CIDR Numbers
• Introduction to Subnetting
• Class A, Class B and Class C Subnetting
• Variable Length Subnet Masking (VLSM)
• Route Summarization/Supernetting
Introduction to Address Resolution
Protocol (ARP)
• Why we need ARP?
• ARP Message format
• Different fields in ARP Message
• ARP Request and Reply
• Different Steps in ARP Communication
• Wireshark analysis of ARP Traffic
• ARP Message format
• Different fields in ARP Message
• ARP Request and Reply
• Different Steps in ARP Communication
• Wireshark analysis of ARP Traffic
Introduction to Internet Control
Messaging Protocol (ICMP)
• Why we need ICMP?
• ICMP Message format
• Different fields in ICMP Message
• Wireshark analysis of ICMP Traffic
• ICMP Message format
• Different fields in ICMP Message
• Wireshark analysis of ICMP Traffic
Introduction to Internet Group
Management Protocol (IGMP)
• Introduction Multicasting
• Why we need IGMP?
• How Multicasting Works
• Relationship between Multicast MAC Addresses and IP Addresses
• Why we need IGMP?
• How Multicasting Works
• Relationship between Multicast MAC Addresses and IP Addresses
OSI Reference Model – Layer 4
• Introduction to Layer 4 (Transport
Layer)
• Brief introduction about different Transport Layer Protocols
• Reliable Transport Protocol and Non-Reliable Transport Protocol
• Multiplexing and De-multiplexing using port numbers
• TCP Header
• Different fields in TCP Header
• Three-way Handshake in TCP
• TCP Sliding Window
• UDP Header
• Different fields in UDP Header
• Difference between TCP and UDP
• Well-known port numbers
• Brief introduction about different Transport Layer Protocols
• Reliable Transport Protocol and Non-Reliable Transport Protocol
• Multiplexing and De-multiplexing using port numbers
• TCP Header
• Different fields in TCP Header
• Three-way Handshake in TCP
• TCP Sliding Window
• UDP Header
• Different fields in UDP Header
• Difference between TCP and UDP
• Well-known port numbers
OSI Reference Model – Layer 7
• Introduction to Layer 7 (Application
Layer)
• Important Application Layer Protocols
o HTTP and HTTPS,
o SMTP, POP
o FTP, TFTP
o Telnet and SSH
o DNS and DHCP
• Important Application Layer Protocols
o HTTP and HTTPS,
o SMTP, POP
o FTP, TFTP
o Telnet and SSH
o DNS and DHCP
TCP/IP Utilities and Commands
• Ping
• Telnet
• Tracert
• Netstat
• Ipconfig
• ifconfig
• Telnet
• Tracert
• Netstat
• Ipconfig
• ifconfig
Part III - Introduction to
Network Infrastructure Devices
• Brief introduction about Cisco Systems
• Introduction to Cisco Internetworking Operating System (IOS)
• Different Memory Parts of a Cisco Router and its usage
• Introduction to Cisco IOS CLI and basic Cisco IOS CLI commands
• User Mode, Privileged Mode and Global Configuration Mode
• IOS CLI Navigation key combinations
• Interface Configuration mode and Sub-Interface configuration mode
• Line Configuration Mode and Router Configuration Mode
• Startup Config file and Running Config file
• Commands copy running-config startup config and copy startup config running-config
• How to password protect enable mode (enable password and enable secret)
• How to password protect line console and line vty
• How to change hostname
• IOS show commands to view information
• How to configure banners
• How to assign a name to an IP address
• How to enable and disable name resolution
• IOS logging and synchronous logging
• Configuring Clock
• Serial Interfaces and How to configure back-to-back serial interfaces
• Introduction to Cisco IOS CLI and basic Cisco IOS CLI commands - Practical Labs
• Introduction to Cisco Internetworking Operating System (IOS)
• Different Memory Parts of a Cisco Router and its usage
• Introduction to Cisco IOS CLI and basic Cisco IOS CLI commands
• User Mode, Privileged Mode and Global Configuration Mode
• IOS CLI Navigation key combinations
• Interface Configuration mode and Sub-Interface configuration mode
• Line Configuration Mode and Router Configuration Mode
• Startup Config file and Running Config file
• Commands copy running-config startup config and copy startup config running-config
• How to password protect enable mode (enable password and enable secret)
• How to password protect line console and line vty
• How to change hostname
• IOS show commands to view information
• How to configure banners
• How to assign a name to an IP address
• How to enable and disable name resolution
• IOS logging and synchronous logging
• Configuring Clock
• Serial Interfaces and How to configure back-to-back serial interfaces
• Introduction to Cisco IOS CLI and basic Cisco IOS CLI commands - Practical Labs
Part V - Routing
Basics of Routing
• Types of Routes
• Routing Protocols and Routed Protocols
• Administrative Distance Value
• Static Routes and Default Routes
• Configuring Static Routes and Default Routes - Practical Lab
• Dynamic Routing
• Distance Vector, Link State and Hybrid Routing Protocols
• Difference between Distance Vector and Link state routing protocols
• Advantages and Disadvantages of Distance Vector and Link State Routing Protocols
• Examples of Distance Vector, Link State and Hybrid Routing protocols
• Metric Value and How the metric value is calculated by different routing protocols
• Autonomous System and Autonomous System Number
• Interior Gateway Protocol and Exterior Gateway Protocol
• Examples of Interior Gateway Protocol and Exterior Gateway Protocol
• Routing Loops (Layer 3 loops) and How routing loops are prevented
• Routing Protocols and Routed Protocols
• Administrative Distance Value
• Static Routes and Default Routes
• Configuring Static Routes and Default Routes - Practical Lab
• Dynamic Routing
• Distance Vector, Link State and Hybrid Routing Protocols
• Difference between Distance Vector and Link state routing protocols
• Advantages and Disadvantages of Distance Vector and Link State Routing Protocols
• Examples of Distance Vector, Link State and Hybrid Routing protocols
• Metric Value and How the metric value is calculated by different routing protocols
• Autonomous System and Autonomous System Number
• Interior Gateway Protocol and Exterior Gateway Protocol
• Examples of Interior Gateway Protocol and Exterior Gateway Protocol
• Routing Loops (Layer 3 loops) and How routing loops are prevented
Introduction to Routing Information
Protocol (RIP)
• RIP Versions
• Classful and Classless Routing protocols
• RIP Metric Value
• Differences between RIPv1 and RIPv2
• Configuring Routing Information Protocol (RIP) - Practical Labs
• Classful and Classless Routing protocols
• RIP Metric Value
• Differences between RIPv1 and RIPv2
• Configuring Routing Information Protocol (RIP) - Practical Labs
Introduction to Enhanced Interior
Gateway Routing Protocol (EIGRP)
• Characteristics of EIGRP
• EIGRP Metric
• EIGRP Metric Calculation formulae and K values
• EIGRP Tables - Topology Table, Neighbor Table and Routing Table
• Successor and Feasible Successor
• DUAL Algorithm
• EIGRP multicast IP address
• Configuring Enhanced Interior Gateway Routing Protocol (EIGRP) - Practical Labs
• EIGRP Metric
• EIGRP Metric Calculation formulae and K values
• EIGRP Tables - Topology Table, Neighbor Table and Routing Table
• Successor and Feasible Successor
• DUAL Algorithm
• EIGRP multicast IP address
• Configuring Enhanced Interior Gateway Routing Protocol (EIGRP) - Practical Labs
Introduction to Open Shortest Path First
(OSPF)
• Characteristics of Open Shortest Path
First (OSPF)
• Open Shortest Path First (OSPF) Metric
• Open Shortest Path First (OSPF) Tables - Topology Table, Neighbor Table and Routing Table
• Open Shortest Path First (OSPF) hierarchical network model and concept of Areas
• Open Shortest Path First (OSPF) Key terms
• Area Border Router (ABR),
• Autonomous System Boundary Router (ASBR)
• Internal Router (IR)
• Backbone Router (BR)
• Designated Router (DR) and Backup Designated Router (BDR)
• Designated Router (DR) and Backup Designated Router (BDR) Election process
• OSPF Router ID
• OSPF multicast IP addresses
• Concept of wildcard masks
• Configuring Open Shortest Path First (OSPF) - Practical Labs
• Open Shortest Path First (OSPF) Metric
• Open Shortest Path First (OSPF) Tables - Topology Table, Neighbor Table and Routing Table
• Open Shortest Path First (OSPF) hierarchical network model and concept of Areas
• Open Shortest Path First (OSPF) Key terms
• Area Border Router (ABR),
• Autonomous System Boundary Router (ASBR)
• Internal Router (IR)
• Backbone Router (BR)
• Designated Router (DR) and Backup Designated Router (BDR)
• Designated Router (DR) and Backup Designated Router (BDR) Election process
• OSPF Router ID
• OSPF multicast IP addresses
• Concept of wildcard masks
• Configuring Open Shortest Path First (OSPF) - Practical Labs
Part VI - Access Control Lists
(ACLs)
• Standard and Extended Access Control
Lists
• Wildcard Mask in detail
• Difference between Standard and Extended Access Control Lists
• Standard and Extended Access Control Number range
• Named and Numbered Access Control Lists
• Access Control Processing order
• Inbound and Outbound traffic
• Where to place Standard and Extended Access Control Lists (ACLs)
• Configuring Access Control Lists (ACLs) - Practical Labs
• Wildcard Mask in detail
• Difference between Standard and Extended Access Control Lists
• Standard and Extended Access Control Number range
• Named and Numbered Access Control Lists
• Access Control Processing order
• Inbound and Outbound traffic
• Where to place Standard and Extended Access Control Lists (ACLs)
• Configuring Access Control Lists (ACLs) - Practical Labs
Part VII - LAN Switching
Introduction to LAN Switching
• Functions of Switching
• Configuring a Cisco Switch from the Command Line
• Management Interface of Cisco Switch
• Configure Management Interface and access a Cisco Switch remotely using Telnet - Practical Labs
• Half-duplex and Full duplex modes
• Functions of a Switch
• CAM (Content Addressable Memory) Table, MAC Address Table
Introduction to Virtual LANs (VLANs)
• Configuring a Cisco Switch from the Command Line
• Management Interface of Cisco Switch
• Configure Management Interface and access a Cisco Switch remotely using Telnet - Practical Labs
• Half-duplex and Full duplex modes
• Functions of a Switch
• CAM (Content Addressable Memory) Table, MAC Address Table
Introduction to Virtual LANs (VLANs)
• Trunk Ports and Access Ports
• Trunk Ports and Access Ports - Practical Labs
• VLAN Trunking Protocol (VTP)
• Virtual LANs (VLANs) - Practical Labs
• VLAN Tagging and IEEE 802.1q
• Native VLAN
• Configuring VLAN – Practical Labs
• Inter-VLAN Routing
• Inter-VLAN Routing – Router-On-a-Stick
• VTP Modes - Server Mode, Client Mode and Transparent Mode
• VTP Modes - Server Mode, Client Mode and Transparent Mode - Practical Labs
• Trunk Negotiation and Dynamic Trunking Protocol (DTP)
• Dynamic Trunking Protocol (DTP) - Practical Labs
• Trunk Ports and Access Ports - Practical Labs
• VLAN Trunking Protocol (VTP)
• Virtual LANs (VLANs) - Practical Labs
• VLAN Tagging and IEEE 802.1q
• Native VLAN
• Configuring VLAN – Practical Labs
• Inter-VLAN Routing
• Inter-VLAN Routing – Router-On-a-Stick
• VTP Modes - Server Mode, Client Mode and Transparent Mode
• VTP Modes - Server Mode, Client Mode and Transparent Mode - Practical Labs
• Trunk Negotiation and Dynamic Trunking Protocol (DTP)
• Dynamic Trunking Protocol (DTP) - Practical Labs
Layer 2 Loops and Broadcast Storms –
Part 1
Introduction to Classic Spanning Tree
Protocol (IEEE 802.1w)
• Three Layer Cisco Campus Network model
- Core Layer, Distribution Layer and Access Layer
• Why Spanning Tree Protocol?
• Introduction to classic Spanning Tree Protocol (IEEE 801.2d)
• Bridge Protocol Data Units (BPDUs)
• Classic Spanning Tree Protocol (IEEE 801.2d) Port States
• Bridge Priority, Bridge ID, Root Bridge and Root Bridge Election
• STP Cost
• Root Port, Designated port and Non-Designated Ports
• Blocking State and Forwarding State Ports
• Spanning Tree Port States
• Per-VLAN Spanning Tree Protocol (PVST+)
• STP Convergence
• Classic Spanning Tree Protocol (IEEE 801.2d) - Practical Labs
• Why Spanning Tree Protocol?
• Introduction to classic Spanning Tree Protocol (IEEE 801.2d)
• Bridge Protocol Data Units (BPDUs)
• Classic Spanning Tree Protocol (IEEE 801.2d) Port States
• Bridge Priority, Bridge ID, Root Bridge and Root Bridge Election
• STP Cost
• Root Port, Designated port and Non-Designated Ports
• Blocking State and Forwarding State Ports
• Spanning Tree Port States
• Per-VLAN Spanning Tree Protocol (PVST+)
• STP Convergence
• Classic Spanning Tree Protocol (IEEE 801.2d) - Practical Labs
Layer 2 Loops and Broadcast Storms –
Part
Introduction to Rapid Spanning Tree
Protocol (IEEE 802.1w)
• Why we need Rapid Spanning Tree Protocol
(IEEE 802.1w)
• Difference between Classic Spanning Tree Protocol and (IEEE 801.2d) and Rapid Spanning Tree Protocol (IEEE 802.1w)
• PortFast, Uplink Fast and Backbone Fast
• Rapid Spanning Tree Protocol (IEEE 802.1w) Port States
• Rapid Spanning Tree Protocol (IEEE 802.1w) - Practical Labs
• Difference between Classic Spanning Tree Protocol and (IEEE 801.2d) and Rapid Spanning Tree Protocol (IEEE 802.1w)
• PortFast, Uplink Fast and Backbone Fast
• Rapid Spanning Tree Protocol (IEEE 802.1w) Port States
• Rapid Spanning Tree Protocol (IEEE 802.1w) - Practical Labs
Layer 2 Security
• BPDU Filter
• BPDU Guard
• Root Guard
• DHCP Snooping
• How to configure BPDU Filter, BPDU Guard, Root Guard, DHCP Snooping - Practical Labs
• BPDU Guard
• Root Guard
• DHCP Snooping
• How to configure BPDU Filter, BPDU Guard, Root Guard, DHCP Snooping - Practical Labs
Part VIII - Network Address
Translation (NAT)
• Static NAT
• Dynamic NAT
• Port Address Translation (PAT)
• Static NAT - Practical Labs
• Dynamic NAT - Practical Labs
• Port Address Translation (PAT) - Practical Labs
• Dynamic NAT
• Port Address Translation (PAT)
• Static NAT - Practical Labs
• Dynamic NAT - Practical Labs
• Port Address Translation (PAT) - Practical Labs
Part IX - IPv6
• Introduction to IPv6
• Why we need IPv6
• Comparison between IPv4 and IPv6
• IPv6 Header format
• Comparison between IPv4 header and IPv6 header
• IPv6 addresses
• How to further simplify IPv6 address
• Types of IPv6 addresses
• Static, Dynamic and Auto-configured IPv6 Addresses
• Unicast, Multicast and Anycast IPV6 Addresses
• How configure IPv6 static route - Practical Labs
• How configure dynamic routing using RIPng - Practical Labs
• Why we need IPv6
• Comparison between IPv4 and IPv6
• IPv6 Header format
• Comparison between IPv4 header and IPv6 header
• IPv6 addresses
• How to further simplify IPv6 address
• Types of IPv6 addresses
• Static, Dynamic and Auto-configured IPv6 Addresses
• Unicast, Multicast and Anycast IPV6 Addresses
• How configure IPv6 static route - Practical Labs
• How configure dynamic routing using RIPng - Practical Labs
Part X - Wide Area Networks
• WAN Connections types
• Leased lines
• Circuit-switched connections
• Packet-switched connections
• Cell-switched connections
• Cisco HDLC
• Cisco HDLC - Practical Labs
• Point-to-Point Protocol (PPP)
• Point-to-Point Protocol (PPP) - Practical Labs
• PPP Authentication PAP and CHAP
• PPP Authentication PAP and CHAP - Practical Labs
• Frame Relay
• Important Frame Relay Terms
• Frame Relay Point-to-Point and Multi-Point type of connections
• Frame Relay - Practical Labs
• Leased lines
• Circuit-switched connections
• Packet-switched connections
• Cell-switched connections
• Cisco HDLC
• Cisco HDLC - Practical Labs
• Point-to-Point Protocol (PPP)
• Point-to-Point Protocol (PPP) - Practical Labs
• PPP Authentication PAP and CHAP
• PPP Authentication PAP and CHAP - Practical Labs
• Frame Relay
• Important Frame Relay Terms
• Frame Relay Point-to-Point and Multi-Point type of connections
• Frame Relay - Practical Labs
Part XI - Basics of Wireless
Networking
• Introduction to Wireless Technology
• The 802.11 Standards
• SSID, BSS, ESS
• WEP, WPA-1 and WPA 2
• The 802.11 Standards
• SSID, BSS, ESS
• WEP, WPA-1 and WPA 2
Part XII - Other Topics
• Cisco Discovery Protocol (CDP)
• SDM and Cisco Configuration Professional (CCP)
• How to configure SDM and Cisco Configuration Professional (CCP) - Practical Labs
• Secure Shell (SSH)
• How to configure SSH in Cisco Router – Practical Labs
• TFTP to backup IOS
• Password Recovery of Cisco Devices – Practical Labs
• SDM and Cisco Configuration Professional (CCP)
• How to configure SDM and Cisco Configuration Professional (CCP) - Practical Labs
• Secure Shell (SSH)
• How to configure SSH in Cisco Router – Practical Labs
• TFTP to backup IOS
• Password Recovery of Cisco Devices – Practical Labs
Free Support Until You Become Certified
Redback students received e-mail support on all the materials covered in their classes for one full year or until they are certified (whichever comes first). Once you complete a course, if you need a review before you take an exam, you may attend the same course again at no additional cost. (Certain restrictions apply.)
Posted by FixNox
MCSE - TRAINING IN VELLORE
MCSA MCSE Windows 2012 Server Course Contents and Course fees in Vellore
Best MCSE 2012 training in Vellore for a training fees of Rs. 10,000/- only!
MCSE 2012 Training Course Contents
Deploying and Managing Windows Server 2012
• Windows Server 2012 Overview• Overview of Windows Server 2012 Management
• Installing Windows Server 2012
• Post-Installation Configuration of Windows Server 2012
• Introduction to Windows Power Shell
• Deploying Windows Server 2012
• Configuring Windows Server 2012 Server Core
• Converting a server with a GUI to or from Server Core
• Managing Servers
• Using Windows Power Shell to Manage Servers
• Configuring NIC teaming
Virtualization with Hyper-V
• Overview of Virtualization Technologies• Implementing Hyper-V
• Managing Virtual Machine Storage
• Managing Virtual Networks
• Installing the Hyper-V Server Role
• Configuring Virtual Networking
• Creating and Configuring a Virtual Machine
• Using Virtual Machine Snapshots
• Non-uniform memory access (NUMA) topology
• Configuring Network Virtualization
• Configuring Port ACLs (network isolation)
• Configuring Single-root I/O virtualization
• Configuring Bandwidth management
Implementing Failover Clustering with Hyper-V
• Overview of Integrating Hyper-V with Failover Clustering• Implementing Hyper-V Virtual Machines on Failover Clusters
• Implementing Hyper-V Virtual Machine Movement
• Managing Hyper-V Virtual Environments by Using VMM
• Configuring Hyper-V Replicas
• Configuring a Failover Cluster for Hyper-V Replica
• Configuring a Highly Available Virtual Machine
Deploying and Maintaining Server Images
• Overview of Windows Deployment Services• Implementing Deployment with WDS
• Administering WDS
Windows Deployment Services
• Installing and Configuring Windows Deployment Services• Creating Operating System Images with WDS
• Configuring Custom Computer Naming
• Deploying Images with WDS
Planning and Implementing a Server Deployment Infrastructure
• Selecting an Appropriate Server Imaging Strategy• Selecting a Deployment Automation Strategy
• Implementing an Automated Deployment Strategy
• Planning an Automated Server Installation and Deployment Strategy
• Preparing the Windows Server Image
• Deploying Windows Server
File and Print Services
• Securing Files and Folders• Protecting Shared Files and Folders Using Shadow Copies
• Configuring Network Printing
• Creating and Configuring a File Share
• Configuring Shadow Copies
• Creating and Configure a Printer Pool
Optimizing File Services
• Overview of FSRM• Using FSRM to Manage Quotas, File Screens, and Storage Reports
• Implementing Classification Management and File Management Tasks
• DFS Overview
• Configuring DFS Namespaces
• Configuring and Troubleshooting DFS Replication
• Configuring FSRM Quotas
• Configuring File Screening
Configuring DFS Namespaces and Replication
• Installing the DFS Namespaces Server Role• Configuring the DFS Role Service
• Configuring DFS Namespace
• Configuring DFS-R
Configuring Encryption and Advanced Auditing
• Encrypting Network Files with EFS• Configuring Advanced Auditing
• Encrypting and Recovering Files
• Configuring Advanced Auditing
• Encrypt network files with EFS. Configure advanced auditing.
Dynamic Access Control
• Overview of Dynamic Access Control• Planning for Dynamic Access Control
• Deploying Dynamic Access Control
• Planning the Dynamic Access Control Implementation
• Configuring User and Device Claims
• Configuring Resource Property Definitions
• Configuring Central Access Rules and Central Access Policies
• Validating and Remediating Dynamic Access Control
• Implementing New Resource Policies
• Configure claim-based Authentication
Storage Management
• Overview of Storage• Introducing Storage Spaces
• Managing Disks and Volumes
• Implementing Storage Spaces
• Installing and Configuring a New Disk
• Resizing Volumes
• Configuring a Redundant Storage Space
Planning and Implementing Storage
• Storage Considerations• Planning and Implementing iSCSI SANs
• Planning a Storage Solution
• Implementing Storage Services
Windows Server Backup and Restore
• Overview of Disaster Recovery• Implementing Windows Server Backup
• Implementing Server and Data Recovery
Implementing Windows Server Backup and Restore
• Backing Up Data on a Windows Server 2012 Server• Restoring Files Using Windows Server Backup
• Implementing Microsoft Online Backup and Restore
• Configure online - backup
• Configure site - level fault tolerance
High Availability
• Overview of NLB• Configuring an NLB Cluster
• Planning an NLB Implementation
• Implementing an NLB Cluster
• Configuring and Managing an NLB Cluster
• Validating High Availability for the NLB Cluster
Implementing Failover Clustering
• Overview of Failover Clustering• Implementing a Failover Cluster
• Configuring Highly Available Applications and Services on a Failover Cluster
• Maintaining a Failover Cluster
• Implementing a Multi-Site Failover Cluster
• Configuring a Failover Cluster
• Deploying and Configuring a Highly Available File Server
• Validating the Deployment of a Highly Available File Server
• Configuring Cluster-Aware Updating on the Failover Cluster
• Configure Storage pools, CSV's ,Dynamic Quorum , Node - Drain, Cluster Aware updating
• Create scale-out file server
• Assign role start-up priority
• Configuring virtual machine application monitoring
WSUS
• Overview of WSUS• Deploying Updates with WSUS
• Implementing the WSUS Server Role
• Configuring Update Settings
• Approving and Deploying an Update by Using WSUS
IP Networking
• Overview of TCP/IP• Understanding IPv4 Addressing
• Subnetting and Supernetting
• Configuring and Troubleshooting IPv4
• Identifying Appropriate Subnets
• Troubleshooting IPv4
• Implementing IPv6
• Overview of IPv6
• IPv6 Addressing
• Coexistence with IPv6
• IPv6 Transition Technologies
• Configuring an IPv6 Network
• Configuring an ISATAP Router
IP Configuration and Address Management Solution (IPAM)
Designing and Implementing DHCP• Planning and Implementing DHCP Scopes
• Planning and Implementing an IPAM Provisioning Strategy
• Designing an IP Addressing Scheme for Contoso (Optional)
• Planning DHCP to Support Your Proposed Scheme
• Planning an IPAM Deployment
• Implementing DHCP and IPAM
Implementing Advanced Network Services
• Configuring Advanced DHCP Features• Configuring Advanced DNS Settings
• Implementing IP Address Management
• Configuring Advanced DHCP Settings
• Configuring Advanced DNS Settings
• Configuring IP Address Management
Network Access Services
• Configuring Network Access• Configuring VPN Access
• Overview of Network Policies
• Troubleshooting Routing and Remote Access
• Configuring DirectAccess
• Configuring Remote Access
• Configuring the DirectAccess Infrastructure
• Configuring Direct Access Clients
• Verifying the Direct Access Configuration
• Configure Direct Access
Network Policy Server (NPS) Network Access Protection (NAP)
• Installing and Configuring a Network Policy Server• Configuring RADIUS Clients and Servers
• NPS Authentication Methods
• Monitoring and Troubleshooting a Network Policy Server
• Installing and Configuring NPS to Support RADIUS
• Configuring a RADIUS Client
• SHV Multi-configuration • Overview of Network Access Protection
• Overview of NAP Enforcement Processes
• Configuring NAP
• Monitoring and Troubleshooting NAP
• Configuring NAP Components
• Configuring the Client Settings to Support NAP
Implementing Dynamic Host Configuration Protocol (DHCP)
• Installing a DHCP Server Role• Configuring DHCP Scopes
• Managing a DHCP Database
• Securing and Monitoring DHCP
• Implementing DHCP
• Implementing a DHCP Relay (Optional Exercise)
Domain Name System (DNS)
• Name Resolution for Windows Client and Servers• Installing and Managing a DNS Server
• Managing DNS Zones
• Installing and Configuring DNS
• Creating Host Records in DNS
• Managing the DNS Server Cache
• The DNS Server Role
• Configuring the DNS Server Role
• Configuring DNS Zones
• Configuring DNS Zone Transfers
• Managing and Troubleshooting DNS
• Configuring DNS Resource Records
• Configuring DNS Conditional Forwarding
• Installing and Configuring DNS Zones
• Managing and Troubleshooting DNS
Windows 2012 Active Directory
Introduction to Active Directory Domain Services• Overview of AD DS
• Overview of Domain Controllers
• Installing a Domain Controller
• Cloning Domain Controller
• Installing Domain Controllers
• Installing a Domain Controller
• Installing a Domain Controller by Using IFM
• Managing Active Directory Domain Services Objects
• Managing User Accounts
• Managing Group Accounts
• Managing Computer Accounts
• Delegating Administration
Managing Active Directory Domain Services Objects
• Delegating Administration for a Branch Office
• Creating and Configuring User Accounts in AD DS
• Managing Computer Objects in AD DS
Automating Active Directory Domain Services Administration
• Using Command-line Tools for Administration
• Using Windows Power Shell for Administration
• Performing Bulk Operations with Windows Power Shell
Maintaining Active Directory Domain Services
• Implementing Virtualized Domain Controllers
• Implementing Read Only Domain Controllers
• Administering AD DS
• Managing the AD DS Database
• Installing and Configuring a Read Only Domain Controller
• Configuring AD DS Snapshots
• Configuring the Active Directory Recycle Bin
Managing User and Service
• Automating User Account Creation
• Configuring Password Policy and Account Lockout Settings
• Creating and Administering User Accounts
• Configuring User Object Attributes
• Configuring Managed Service Accounts
• Configuring Password Policy and Account Lockout Settings
• Creating and Associating a Managed Service Account
Automating AD DS Administration by Using Windows Power Shell• Creating User Accounts and Groups by Using Windows Power Shell
• Using Windows Power Shell to Create User Accounts in Bulk
• Using Windows Power Shell to Modify User Accounts in Bulk
Implementing Distributed Active Directory Domain Services Deployments
• Overview of Distributed AD DS Deployments
• Implementing a Distributed AD DS Environment
• Configuring AD DS Trusts
Implementing Complex AD DS Deployments
• Implementing Child Domains in AD DS
• Implementing Forest Trusts
Implementing Active Directory Domain Services Sites and Replication
• Overview of AD DS Replication
• Configuring AD DS Sites
• Configuring and Monitoring AD DS Replication
• Modifying the Default Site
• Creating Additional Sites and Subnets
• Configuring AD DS Replication
Active Directory Certificate Services
Implementing Active Directory Certificate Services
• PKI Overview
• Deploying CAs
• Deploying and Managing Certificate Templates
• Implementing Certificate Distribution and Revocation
• Managing Certificate Recovery
• Deploying a Standalone Root CA
• Deploying an Enterprise Subordinate CA
• Configuring Certificate Templates
• Configuring Certificate Enrollment
• Configuring Certificate Revocation
• Configuring Key Recovery
Active Directory Group Policy
Implementing Group Policy• Overview of Group Policy
• Group Policy Processing
• Configuring a Central Store
• Creating GPOs
• Implementing and Administering GPOs
• Managing Group Policy Scope
• Creating and Configuring Group Policy Objects
• Managing Group Policy Scope
• Verifying Group Policy Application
• Managing Group Policy Objects
• Windows Security Overview
• Configuring Security Settings
Managing User Desktops with Group Policy
• Configuring Folder Redirection and Scripts
• Configuring Group Policy Preferences
• Managing Software with Group Policy
• Implementing Settings by Using Group Policy Preferences
• Configuring Folder Redirection
Monitoring Windows Server 2012
• Monitoring Tools
• Using Performance Monitor
• Monitoring Event Logs
• Establishing a Performance Baseline
• Identifying the Source of a Performance Problem
• Viewing and Configuring Centralized Event Logs
Click the following link to visit official Microsoft MCSA MCSE Windows 2012 certification page
NETWORK SERVER MAINTENANCE & IT MAINTENANCE
NETWORK SERVER MAINTENANCE & IT MAINTENANCE
Server Maintenance Contracts, Networking Maintenance
Server Maintenance Contracts, Networking Maintenance
Redback IT Solutions, Inc. offers server and
network maintenance to business owners running Windows Server operating
systems. We offer a variety of maintenance contracts and can custom design a
maintenance plan to fit your IT infrastructure. Server maintenance is an
important component of a secure and reliable network. Our Network Engineers are
trained to look for potential problems by reviewing server logs, firewall logs
and inspecting Server hardware. Most business owners don't understand the risk
involved in not performing preventative maintenance. The most common problems
that occur from lack of maintenance are RAID failures, database corruption,
backup failures (tape, software problems) and anti-virus scanner failures.
We offer maintenance on Windows Server 2011,
Windows Server 2008, Windows Server 2003 and Windows Server 2000.
|
|
Network Server Maintenance
|
|
|
|
|
Network Servers
|
|
Network Printers
|
|
Computer Workstations
|
|
Network Switches and Hubs
|
|
Network Firewall and Routers
|
|
Cabling and Power Systems
|
|
Data Backup Systems
|
|
|
We also offer Exchange server installation, server
administration, server maintenance, network
service plans, Cloud Computing, server upgrade, server consolodation, virtual
server, server migration and
much more.
Why Should You Become Certified?
Why Should You Become Certified?
Life-long learning are the keywords to your future success.
Do you want a career with a future?
You should add regular updates to your skills and knowledge. Unless, you have already decided that your current skills and job are good enough for your future.
Knowledge is power, especially in the current job market. Documentation of your skills enables you to move upwards in your organization.
Getting a certificate proves your commitment to upgrade your skills, gives you the credibility needed for more responsibilities, larger projects, and a higher salary.
In addition, documented knowledge is often the key factor when hiring new personnel. Your certificate might advance your career or help you to start a new one.
Also have in mind that employees with certifications increase their company's chances of retaining old and getting new customers. You will do your company a favor getting certified. Expect your company to support you in this.
Posted by FixNox
REDBACK SOLUTIONS is now ISO Certified!
REDBACK SOLUTIONS is now ISO Certified!
ISO 9001:2008 - Quality management systems
ISO 27001:2005 Information Security Management System
Redback Solutions is proud to announce that we have achieved ISO 9001:2008 & ISO 27001:2005 certification. This achievement is an important milestone for us as it brings us a step closer to our corporate goals. Through a process of continuous improvement, we endeavor to deliver products and services of the highest of quality.
In the process of achieving the ISO 9001:2008 & ISO 27001:2005 certification, we strongly feel that Redback Solutions has gained value across all of our companies. We are both proud and grateful for the excellent teamwork displayed by our employees in achieving this milestone.
We would like to take this opportunity to extend our most sincere gratitude to our suppliers and customers. Our customers have shown us the value of high expectations and the feedback you have provided to us has proven invaluable in our refinement process.
Moving forward, we truly believe that our Quality System defined by the ISO certification will enable us to provide you, our customer, added value in our products and services. At Redback Solutions , the process of continuous improvement is now moving ahead stronger than ever. With our goals focused on the emphasis of quality assurance, we look forward to bringing the business to new heights in the months and years to come.
ISO 9001:2008 - Quality management systems
ISO 27001:2005 Information Security Management System
Redback Solutions is proud to announce that we have achieved ISO 9001:2008 & ISO 27001:2005 certification. This achievement is an important milestone for us as it brings us a step closer to our corporate goals. Through a process of continuous improvement, we endeavor to deliver products and services of the highest of quality.
In the process of achieving the ISO 9001:2008 & ISO 27001:2005 certification, we strongly feel that Redback Solutions has gained value across all of our companies. We are both proud and grateful for the excellent teamwork displayed by our employees in achieving this milestone.
We would like to take this opportunity to extend our most sincere gratitude to our suppliers and customers. Our customers have shown us the value of high expectations and the feedback you have provided to us has proven invaluable in our refinement process.
Moving forward, we truly believe that our Quality System defined by the ISO certification will enable us to provide you, our customer, added value in our products and services. At Redback Solutions , the process of continuous improvement is now moving ahead stronger than ever. With our goals focused on the emphasis of quality assurance, we look forward to bringing the business to new heights in the months and years to come.