Archive for June 2013
CCNA TRAINING IN VELLORE
CCNA
Course Contents and CCNA Course fees in Vellore
Best CCNA training in Chennai
using real Routers and Switches for a training fees of Rs. 5000/- only!
No Simulators or Emulators!
Assured Quality!! Rush now.. Limited period offer!!!
CCNA Training Course Contents
Part I - Basics of Networking
Basic Definitions
• What is a Computer Network?
• Local Area Network (LAN)
• Wide Area Network (WAN)
• Internet, Intranet, Extranet
• Peer-to-Peer Networks and Client-Server Networks
• Local Area Network (LAN)
• Wide Area Network (WAN)
• Internet, Intranet, Extranet
• Peer-to-Peer Networks and Client-Server Networks
Network Topologies
• Bus Topology
• Star Topology
• Extended Star Topology
• Ring Topology
• Mesh Topology
• Hybrid Topology
• Star Topology
• Extended Star Topology
• Ring Topology
• Mesh Topology
• Hybrid Topology
Networking Media and Connectors
• Co-axial Cable
• Twisted Pairs(STP,UTP)
• Wiring Scheme
• EIA/TIA-568A/568B Standards
• Straight-Through and Cross Over Cables
• Crimping Straight-Through and Cross Over cables - Practical Labs
• Networking Media Standards
• Twisted Pairs(STP,UTP)
• Wiring Scheme
• EIA/TIA-568A/568B Standards
• Straight-Through and Cross Over Cables
• Crimping Straight-Through and Cross Over cables - Practical Labs
• Networking Media Standards
LAN Technologies – Ethernet
• IEEE 802 Standards
• IEEE 802.3 Standards
• LAN Hubs and Switches
• How Switches operate
• Collision Domain and Broadcast Domain
• Access Methods
• CSMA/CD
• CSMA/CA
• Token Passing
• IEEE 802.3 Standards
• LAN Hubs and Switches
• How Switches operate
• Collision Domain and Broadcast Domain
• Access Methods
• CSMA/CD
• CSMA/CA
• Token Passing
Networks Protocols
• What are Routable and Non-Routable Network Protocols?
• Brief Discussion about proprietary network protocols
• NetBEUI
• IPX/SPX
• AppleTalk
• What are Routable and Non-Routable Network Protocols?
• Brief Discussion about proprietary network protocols
• NetBEUI
• IPX/SPX
• AppleTalk
Part II - Introduction to TCP/IP
- Industry Standard Network Protocol
Basic Terms
• Request for Comments (RFC)
• The OSI reference model
• Seven Layers of OSI Models and the functions of each layer
• TCP/IP network model
• Comparison between TCP/IP and OSI models
• Host-to-Host Communication model
• Encapsulation and Decapsulation
• Data Packets at different layers of OSI reference model
• Brief explanation of different protocols at each layer
• Closer look at TCP/IP data communication
• The OSI reference model
• Seven Layers of OSI Models and the functions of each layer
• TCP/IP network model
• Comparison between TCP/IP and OSI models
• Host-to-Host Communication model
• Encapsulation and Decapsulation
• Data Packets at different layers of OSI reference model
• Brief explanation of different protocols at each layer
• Closer look at TCP/IP data communication
OSI Reference model – Layer 2
• Introduction to Layer 2 (Data link
Layer)
• Brief discussion about different Layer 2 Standards
• More about Ethernet
• Ethernet Frame format
• Different fields in an Ethernet Frame and explanation
• Introduction to Layer 2 Addresses (MAC Addresses)
• Binary/Decimal/Hexadecimal number systems
• Binary/Decimal/Hexadecimal conversions
• Structure of MAC Addresses
• Three modes of network communication Unicast, Multicast and Broadcast
• Unicast/Multicast/Broadcast MAC Addresses
• Brief discussion about different Layer 2 Standards
• More about Ethernet
• Ethernet Frame format
• Different fields in an Ethernet Frame and explanation
• Introduction to Layer 2 Addresses (MAC Addresses)
• Binary/Decimal/Hexadecimal number systems
• Binary/Decimal/Hexadecimal conversions
• Structure of MAC Addresses
• Three modes of network communication Unicast, Multicast and Broadcast
• Unicast/Multicast/Broadcast MAC Addresses
OSI Reference Model – Layer 3
• Introduction to Layer 3 (Network
Layer)
• Brief discussion about different Layer 3 Protocols
• Introduction to Internet Protocol Version 4(IPv4)
• IP Header and different fields in IPv4 Header
• Introduction to Layer 3 Addresses (IPv4 Addresses)
• Wireshark Analysis of IPv4 Traffic
• Brief discussion about different Layer 3 Protocols
• Introduction to Internet Protocol Version 4(IPv4)
• IP Header and different fields in IPv4 Header
• Introduction to Layer 3 Addresses (IPv4 Addresses)
• Wireshark Analysis of IPv4 Traffic
IP Addresses, Subnetting and Route
Summarization/Supernetting
• Class A, B, C, D and E IP Addresses
• Network part and Host part in an IP Address
• What is subnet mask and why we need subnet mask
• CIDR Numbers
• Introduction to Subnetting
• Class A, Class B and Class C Subnetting
• Variable Length Subnet Masking (VLSM)
• Route Summarization/Supernetting
• Network part and Host part in an IP Address
• What is subnet mask and why we need subnet mask
• CIDR Numbers
• Introduction to Subnetting
• Class A, Class B and Class C Subnetting
• Variable Length Subnet Masking (VLSM)
• Route Summarization/Supernetting
Introduction to Address Resolution
Protocol (ARP)
• Why we need ARP?
• ARP Message format
• Different fields in ARP Message
• ARP Request and Reply
• Different Steps in ARP Communication
• Wireshark analysis of ARP Traffic
• ARP Message format
• Different fields in ARP Message
• ARP Request and Reply
• Different Steps in ARP Communication
• Wireshark analysis of ARP Traffic
Introduction to Internet Control
Messaging Protocol (ICMP)
• Why we need ICMP?
• ICMP Message format
• Different fields in ICMP Message
• Wireshark analysis of ICMP Traffic
• ICMP Message format
• Different fields in ICMP Message
• Wireshark analysis of ICMP Traffic
Introduction to Internet Group
Management Protocol (IGMP)
• Introduction Multicasting
• Why we need IGMP?
• How Multicasting Works
• Relationship between Multicast MAC Addresses and IP Addresses
• Why we need IGMP?
• How Multicasting Works
• Relationship between Multicast MAC Addresses and IP Addresses
OSI Reference Model – Layer 4
• Introduction to Layer 4 (Transport
Layer)
• Brief introduction about different Transport Layer Protocols
• Reliable Transport Protocol and Non-Reliable Transport Protocol
• Multiplexing and De-multiplexing using port numbers
• TCP Header
• Different fields in TCP Header
• Three-way Handshake in TCP
• TCP Sliding Window
• UDP Header
• Different fields in UDP Header
• Difference between TCP and UDP
• Well-known port numbers
• Brief introduction about different Transport Layer Protocols
• Reliable Transport Protocol and Non-Reliable Transport Protocol
• Multiplexing and De-multiplexing using port numbers
• TCP Header
• Different fields in TCP Header
• Three-way Handshake in TCP
• TCP Sliding Window
• UDP Header
• Different fields in UDP Header
• Difference between TCP and UDP
• Well-known port numbers
OSI Reference Model – Layer 7
• Introduction to Layer 7 (Application
Layer)
• Important Application Layer Protocols
o HTTP and HTTPS,
o SMTP, POP
o FTP, TFTP
o Telnet and SSH
o DNS and DHCP
• Important Application Layer Protocols
o HTTP and HTTPS,
o SMTP, POP
o FTP, TFTP
o Telnet and SSH
o DNS and DHCP
TCP/IP Utilities and Commands
• Ping
• Telnet
• Tracert
• Netstat
• Ipconfig
• ifconfig
• Telnet
• Tracert
• Netstat
• Ipconfig
• ifconfig
Part III - Introduction to
Network Infrastructure Devices
• Brief introduction about Cisco Systems
• Introduction to Cisco Internetworking Operating System (IOS)
• Different Memory Parts of a Cisco Router and its usage
• Introduction to Cisco IOS CLI and basic Cisco IOS CLI commands
• User Mode, Privileged Mode and Global Configuration Mode
• IOS CLI Navigation key combinations
• Interface Configuration mode and Sub-Interface configuration mode
• Line Configuration Mode and Router Configuration Mode
• Startup Config file and Running Config file
• Commands copy running-config startup config and copy startup config running-config
• How to password protect enable mode (enable password and enable secret)
• How to password protect line console and line vty
• How to change hostname
• IOS show commands to view information
• How to configure banners
• How to assign a name to an IP address
• How to enable and disable name resolution
• IOS logging and synchronous logging
• Configuring Clock
• Serial Interfaces and How to configure back-to-back serial interfaces
• Introduction to Cisco IOS CLI and basic Cisco IOS CLI commands - Practical Labs
• Introduction to Cisco Internetworking Operating System (IOS)
• Different Memory Parts of a Cisco Router and its usage
• Introduction to Cisco IOS CLI and basic Cisco IOS CLI commands
• User Mode, Privileged Mode and Global Configuration Mode
• IOS CLI Navigation key combinations
• Interface Configuration mode and Sub-Interface configuration mode
• Line Configuration Mode and Router Configuration Mode
• Startup Config file and Running Config file
• Commands copy running-config startup config and copy startup config running-config
• How to password protect enable mode (enable password and enable secret)
• How to password protect line console and line vty
• How to change hostname
• IOS show commands to view information
• How to configure banners
• How to assign a name to an IP address
• How to enable and disable name resolution
• IOS logging and synchronous logging
• Configuring Clock
• Serial Interfaces and How to configure back-to-back serial interfaces
• Introduction to Cisco IOS CLI and basic Cisco IOS CLI commands - Practical Labs
Part V - Routing
Basics of Routing
• Types of Routes
• Routing Protocols and Routed Protocols
• Administrative Distance Value
• Static Routes and Default Routes
• Configuring Static Routes and Default Routes - Practical Lab
• Dynamic Routing
• Distance Vector, Link State and Hybrid Routing Protocols
• Difference between Distance Vector and Link state routing protocols
• Advantages and Disadvantages of Distance Vector and Link State Routing Protocols
• Examples of Distance Vector, Link State and Hybrid Routing protocols
• Metric Value and How the metric value is calculated by different routing protocols
• Autonomous System and Autonomous System Number
• Interior Gateway Protocol and Exterior Gateway Protocol
• Examples of Interior Gateway Protocol and Exterior Gateway Protocol
• Routing Loops (Layer 3 loops) and How routing loops are prevented
• Routing Protocols and Routed Protocols
• Administrative Distance Value
• Static Routes and Default Routes
• Configuring Static Routes and Default Routes - Practical Lab
• Dynamic Routing
• Distance Vector, Link State and Hybrid Routing Protocols
• Difference between Distance Vector and Link state routing protocols
• Advantages and Disadvantages of Distance Vector and Link State Routing Protocols
• Examples of Distance Vector, Link State and Hybrid Routing protocols
• Metric Value and How the metric value is calculated by different routing protocols
• Autonomous System and Autonomous System Number
• Interior Gateway Protocol and Exterior Gateway Protocol
• Examples of Interior Gateway Protocol and Exterior Gateway Protocol
• Routing Loops (Layer 3 loops) and How routing loops are prevented
Introduction to Routing Information
Protocol (RIP)
• RIP Versions
• Classful and Classless Routing protocols
• RIP Metric Value
• Differences between RIPv1 and RIPv2
• Configuring Routing Information Protocol (RIP) - Practical Labs
• Classful and Classless Routing protocols
• RIP Metric Value
• Differences between RIPv1 and RIPv2
• Configuring Routing Information Protocol (RIP) - Practical Labs
Introduction to Enhanced Interior
Gateway Routing Protocol (EIGRP)
• Characteristics of EIGRP
• EIGRP Metric
• EIGRP Metric Calculation formulae and K values
• EIGRP Tables - Topology Table, Neighbor Table and Routing Table
• Successor and Feasible Successor
• DUAL Algorithm
• EIGRP multicast IP address
• Configuring Enhanced Interior Gateway Routing Protocol (EIGRP) - Practical Labs
• EIGRP Metric
• EIGRP Metric Calculation formulae and K values
• EIGRP Tables - Topology Table, Neighbor Table and Routing Table
• Successor and Feasible Successor
• DUAL Algorithm
• EIGRP multicast IP address
• Configuring Enhanced Interior Gateway Routing Protocol (EIGRP) - Practical Labs
Introduction to Open Shortest Path First
(OSPF)
• Characteristics of Open Shortest Path
First (OSPF)
• Open Shortest Path First (OSPF) Metric
• Open Shortest Path First (OSPF) Tables - Topology Table, Neighbor Table and Routing Table
• Open Shortest Path First (OSPF) hierarchical network model and concept of Areas
• Open Shortest Path First (OSPF) Key terms
• Area Border Router (ABR),
• Autonomous System Boundary Router (ASBR)
• Internal Router (IR)
• Backbone Router (BR)
• Designated Router (DR) and Backup Designated Router (BDR)
• Designated Router (DR) and Backup Designated Router (BDR) Election process
• OSPF Router ID
• OSPF multicast IP addresses
• Concept of wildcard masks
• Configuring Open Shortest Path First (OSPF) - Practical Labs
• Open Shortest Path First (OSPF) Metric
• Open Shortest Path First (OSPF) Tables - Topology Table, Neighbor Table and Routing Table
• Open Shortest Path First (OSPF) hierarchical network model and concept of Areas
• Open Shortest Path First (OSPF) Key terms
• Area Border Router (ABR),
• Autonomous System Boundary Router (ASBR)
• Internal Router (IR)
• Backbone Router (BR)
• Designated Router (DR) and Backup Designated Router (BDR)
• Designated Router (DR) and Backup Designated Router (BDR) Election process
• OSPF Router ID
• OSPF multicast IP addresses
• Concept of wildcard masks
• Configuring Open Shortest Path First (OSPF) - Practical Labs
Part VI - Access Control Lists
(ACLs)
• Standard and Extended Access Control
Lists
• Wildcard Mask in detail
• Difference between Standard and Extended Access Control Lists
• Standard and Extended Access Control Number range
• Named and Numbered Access Control Lists
• Access Control Processing order
• Inbound and Outbound traffic
• Where to place Standard and Extended Access Control Lists (ACLs)
• Configuring Access Control Lists (ACLs) - Practical Labs
• Wildcard Mask in detail
• Difference between Standard and Extended Access Control Lists
• Standard and Extended Access Control Number range
• Named and Numbered Access Control Lists
• Access Control Processing order
• Inbound and Outbound traffic
• Where to place Standard and Extended Access Control Lists (ACLs)
• Configuring Access Control Lists (ACLs) - Practical Labs
Part VII - LAN Switching
Introduction to LAN Switching
• Functions of Switching
• Configuring a Cisco Switch from the Command Line
• Management Interface of Cisco Switch
• Configure Management Interface and access a Cisco Switch remotely using Telnet - Practical Labs
• Half-duplex and Full duplex modes
• Functions of a Switch
• CAM (Content Addressable Memory) Table, MAC Address Table
Introduction to Virtual LANs (VLANs)
• Configuring a Cisco Switch from the Command Line
• Management Interface of Cisco Switch
• Configure Management Interface and access a Cisco Switch remotely using Telnet - Practical Labs
• Half-duplex and Full duplex modes
• Functions of a Switch
• CAM (Content Addressable Memory) Table, MAC Address Table
Introduction to Virtual LANs (VLANs)
• Trunk Ports and Access Ports
• Trunk Ports and Access Ports - Practical Labs
• VLAN Trunking Protocol (VTP)
• Virtual LANs (VLANs) - Practical Labs
• VLAN Tagging and IEEE 802.1q
• Native VLAN
• Configuring VLAN – Practical Labs
• Inter-VLAN Routing
• Inter-VLAN Routing – Router-On-a-Stick
• VTP Modes - Server Mode, Client Mode and Transparent Mode
• VTP Modes - Server Mode, Client Mode and Transparent Mode - Practical Labs
• Trunk Negotiation and Dynamic Trunking Protocol (DTP)
• Dynamic Trunking Protocol (DTP) - Practical Labs
• Trunk Ports and Access Ports - Practical Labs
• VLAN Trunking Protocol (VTP)
• Virtual LANs (VLANs) - Practical Labs
• VLAN Tagging and IEEE 802.1q
• Native VLAN
• Configuring VLAN – Practical Labs
• Inter-VLAN Routing
• Inter-VLAN Routing – Router-On-a-Stick
• VTP Modes - Server Mode, Client Mode and Transparent Mode
• VTP Modes - Server Mode, Client Mode and Transparent Mode - Practical Labs
• Trunk Negotiation and Dynamic Trunking Protocol (DTP)
• Dynamic Trunking Protocol (DTP) - Practical Labs
Layer 2 Loops and Broadcast Storms –
Part 1
Introduction to Classic Spanning Tree
Protocol (IEEE 802.1w)
• Three Layer Cisco Campus Network model
- Core Layer, Distribution Layer and Access Layer
• Why Spanning Tree Protocol?
• Introduction to classic Spanning Tree Protocol (IEEE 801.2d)
• Bridge Protocol Data Units (BPDUs)
• Classic Spanning Tree Protocol (IEEE 801.2d) Port States
• Bridge Priority, Bridge ID, Root Bridge and Root Bridge Election
• STP Cost
• Root Port, Designated port and Non-Designated Ports
• Blocking State and Forwarding State Ports
• Spanning Tree Port States
• Per-VLAN Spanning Tree Protocol (PVST+)
• STP Convergence
• Classic Spanning Tree Protocol (IEEE 801.2d) - Practical Labs
• Why Spanning Tree Protocol?
• Introduction to classic Spanning Tree Protocol (IEEE 801.2d)
• Bridge Protocol Data Units (BPDUs)
• Classic Spanning Tree Protocol (IEEE 801.2d) Port States
• Bridge Priority, Bridge ID, Root Bridge and Root Bridge Election
• STP Cost
• Root Port, Designated port and Non-Designated Ports
• Blocking State and Forwarding State Ports
• Spanning Tree Port States
• Per-VLAN Spanning Tree Protocol (PVST+)
• STP Convergence
• Classic Spanning Tree Protocol (IEEE 801.2d) - Practical Labs
Layer 2 Loops and Broadcast Storms –
Part
Introduction to Rapid Spanning Tree
Protocol (IEEE 802.1w)
• Why we need Rapid Spanning Tree Protocol
(IEEE 802.1w)
• Difference between Classic Spanning Tree Protocol and (IEEE 801.2d) and Rapid Spanning Tree Protocol (IEEE 802.1w)
• PortFast, Uplink Fast and Backbone Fast
• Rapid Spanning Tree Protocol (IEEE 802.1w) Port States
• Rapid Spanning Tree Protocol (IEEE 802.1w) - Practical Labs
• Difference between Classic Spanning Tree Protocol and (IEEE 801.2d) and Rapid Spanning Tree Protocol (IEEE 802.1w)
• PortFast, Uplink Fast and Backbone Fast
• Rapid Spanning Tree Protocol (IEEE 802.1w) Port States
• Rapid Spanning Tree Protocol (IEEE 802.1w) - Practical Labs
Layer 2 Security
• BPDU Filter
• BPDU Guard
• Root Guard
• DHCP Snooping
• How to configure BPDU Filter, BPDU Guard, Root Guard, DHCP Snooping - Practical Labs
• BPDU Guard
• Root Guard
• DHCP Snooping
• How to configure BPDU Filter, BPDU Guard, Root Guard, DHCP Snooping - Practical Labs
Part VIII - Network Address
Translation (NAT)
• Static NAT
• Dynamic NAT
• Port Address Translation (PAT)
• Static NAT - Practical Labs
• Dynamic NAT - Practical Labs
• Port Address Translation (PAT) - Practical Labs
• Dynamic NAT
• Port Address Translation (PAT)
• Static NAT - Practical Labs
• Dynamic NAT - Practical Labs
• Port Address Translation (PAT) - Practical Labs
Part IX - IPv6
• Introduction to IPv6
• Why we need IPv6
• Comparison between IPv4 and IPv6
• IPv6 Header format
• Comparison between IPv4 header and IPv6 header
• IPv6 addresses
• How to further simplify IPv6 address
• Types of IPv6 addresses
• Static, Dynamic and Auto-configured IPv6 Addresses
• Unicast, Multicast and Anycast IPV6 Addresses
• How configure IPv6 static route - Practical Labs
• How configure dynamic routing using RIPng - Practical Labs
• Why we need IPv6
• Comparison between IPv4 and IPv6
• IPv6 Header format
• Comparison between IPv4 header and IPv6 header
• IPv6 addresses
• How to further simplify IPv6 address
• Types of IPv6 addresses
• Static, Dynamic and Auto-configured IPv6 Addresses
• Unicast, Multicast and Anycast IPV6 Addresses
• How configure IPv6 static route - Practical Labs
• How configure dynamic routing using RIPng - Practical Labs
Part X - Wide Area Networks
• WAN Connections types
• Leased lines
• Circuit-switched connections
• Packet-switched connections
• Cell-switched connections
• Cisco HDLC
• Cisco HDLC - Practical Labs
• Point-to-Point Protocol (PPP)
• Point-to-Point Protocol (PPP) - Practical Labs
• PPP Authentication PAP and CHAP
• PPP Authentication PAP and CHAP - Practical Labs
• Frame Relay
• Important Frame Relay Terms
• Frame Relay Point-to-Point and Multi-Point type of connections
• Frame Relay - Practical Labs
• Leased lines
• Circuit-switched connections
• Packet-switched connections
• Cell-switched connections
• Cisco HDLC
• Cisco HDLC - Practical Labs
• Point-to-Point Protocol (PPP)
• Point-to-Point Protocol (PPP) - Practical Labs
• PPP Authentication PAP and CHAP
• PPP Authentication PAP and CHAP - Practical Labs
• Frame Relay
• Important Frame Relay Terms
• Frame Relay Point-to-Point and Multi-Point type of connections
• Frame Relay - Practical Labs
Part XI - Basics of Wireless
Networking
• Introduction to Wireless Technology
• The 802.11 Standards
• SSID, BSS, ESS
• WEP, WPA-1 and WPA 2
• The 802.11 Standards
• SSID, BSS, ESS
• WEP, WPA-1 and WPA 2
Part XII - Other Topics
• Cisco Discovery Protocol (CDP)
• SDM and Cisco Configuration Professional (CCP)
• How to configure SDM and Cisco Configuration Professional (CCP) - Practical Labs
• Secure Shell (SSH)
• How to configure SSH in Cisco Router – Practical Labs
• TFTP to backup IOS
• Password Recovery of Cisco Devices – Practical Labs
• SDM and Cisco Configuration Professional (CCP)
• How to configure SDM and Cisco Configuration Professional (CCP) - Practical Labs
• Secure Shell (SSH)
• How to configure SSH in Cisco Router – Practical Labs
• TFTP to backup IOS
• Password Recovery of Cisco Devices – Practical Labs
Free Support Until You Become Certified
Redback students received e-mail support on all the materials covered in their classes for one full year or until they are certified (whichever comes first). Once you complete a course, if you need a review before you take an exam, you may attend the same course again at no additional cost. (Certain restrictions apply.)
Posted by FixNox
MCSE - TRAINING IN VELLORE
MCSA MCSE Windows 2012 Server Course Contents and Course fees in Vellore
Best MCSE 2012 training in Vellore for a training fees of Rs. 10,000/- only!
MCSE 2012 Training Course Contents
Deploying and Managing Windows Server 2012
• Windows Server 2012 Overview• Overview of Windows Server 2012 Management
• Installing Windows Server 2012
• Post-Installation Configuration of Windows Server 2012
• Introduction to Windows Power Shell
• Deploying Windows Server 2012
• Configuring Windows Server 2012 Server Core
• Converting a server with a GUI to or from Server Core
• Managing Servers
• Using Windows Power Shell to Manage Servers
• Configuring NIC teaming
Virtualization with Hyper-V
• Overview of Virtualization Technologies• Implementing Hyper-V
• Managing Virtual Machine Storage
• Managing Virtual Networks
• Installing the Hyper-V Server Role
• Configuring Virtual Networking
• Creating and Configuring a Virtual Machine
• Using Virtual Machine Snapshots
• Non-uniform memory access (NUMA) topology
• Configuring Network Virtualization
• Configuring Port ACLs (network isolation)
• Configuring Single-root I/O virtualization
• Configuring Bandwidth management
Implementing Failover Clustering with Hyper-V
• Overview of Integrating Hyper-V with Failover Clustering• Implementing Hyper-V Virtual Machines on Failover Clusters
• Implementing Hyper-V Virtual Machine Movement
• Managing Hyper-V Virtual Environments by Using VMM
• Configuring Hyper-V Replicas
• Configuring a Failover Cluster for Hyper-V Replica
• Configuring a Highly Available Virtual Machine
Deploying and Maintaining Server Images
• Overview of Windows Deployment Services• Implementing Deployment with WDS
• Administering WDS
Windows Deployment Services
• Installing and Configuring Windows Deployment Services• Creating Operating System Images with WDS
• Configuring Custom Computer Naming
• Deploying Images with WDS
Planning and Implementing a Server Deployment Infrastructure
• Selecting an Appropriate Server Imaging Strategy• Selecting a Deployment Automation Strategy
• Implementing an Automated Deployment Strategy
• Planning an Automated Server Installation and Deployment Strategy
• Preparing the Windows Server Image
• Deploying Windows Server
File and Print Services
• Securing Files and Folders• Protecting Shared Files and Folders Using Shadow Copies
• Configuring Network Printing
• Creating and Configuring a File Share
• Configuring Shadow Copies
• Creating and Configure a Printer Pool
Optimizing File Services
• Overview of FSRM• Using FSRM to Manage Quotas, File Screens, and Storage Reports
• Implementing Classification Management and File Management Tasks
• DFS Overview
• Configuring DFS Namespaces
• Configuring and Troubleshooting DFS Replication
• Configuring FSRM Quotas
• Configuring File Screening
Configuring DFS Namespaces and Replication
• Installing the DFS Namespaces Server Role• Configuring the DFS Role Service
• Configuring DFS Namespace
• Configuring DFS-R
Configuring Encryption and Advanced Auditing
• Encrypting Network Files with EFS• Configuring Advanced Auditing
• Encrypting and Recovering Files
• Configuring Advanced Auditing
• Encrypt network files with EFS. Configure advanced auditing.
Dynamic Access Control
• Overview of Dynamic Access Control• Planning for Dynamic Access Control
• Deploying Dynamic Access Control
• Planning the Dynamic Access Control Implementation
• Configuring User and Device Claims
• Configuring Resource Property Definitions
• Configuring Central Access Rules and Central Access Policies
• Validating and Remediating Dynamic Access Control
• Implementing New Resource Policies
• Configure claim-based Authentication
Storage Management
• Overview of Storage• Introducing Storage Spaces
• Managing Disks and Volumes
• Implementing Storage Spaces
• Installing and Configuring a New Disk
• Resizing Volumes
• Configuring a Redundant Storage Space
Planning and Implementing Storage
• Storage Considerations• Planning and Implementing iSCSI SANs
• Planning a Storage Solution
• Implementing Storage Services
Windows Server Backup and Restore
• Overview of Disaster Recovery• Implementing Windows Server Backup
• Implementing Server and Data Recovery
Implementing Windows Server Backup and Restore
• Backing Up Data on a Windows Server 2012 Server• Restoring Files Using Windows Server Backup
• Implementing Microsoft Online Backup and Restore
• Configure online - backup
• Configure site - level fault tolerance
High Availability
• Overview of NLB• Configuring an NLB Cluster
• Planning an NLB Implementation
• Implementing an NLB Cluster
• Configuring and Managing an NLB Cluster
• Validating High Availability for the NLB Cluster
Implementing Failover Clustering
• Overview of Failover Clustering• Implementing a Failover Cluster
• Configuring Highly Available Applications and Services on a Failover Cluster
• Maintaining a Failover Cluster
• Implementing a Multi-Site Failover Cluster
• Configuring a Failover Cluster
• Deploying and Configuring a Highly Available File Server
• Validating the Deployment of a Highly Available File Server
• Configuring Cluster-Aware Updating on the Failover Cluster
• Configure Storage pools, CSV's ,Dynamic Quorum , Node - Drain, Cluster Aware updating
• Create scale-out file server
• Assign role start-up priority
• Configuring virtual machine application monitoring
WSUS
• Overview of WSUS• Deploying Updates with WSUS
• Implementing the WSUS Server Role
• Configuring Update Settings
• Approving and Deploying an Update by Using WSUS
IP Networking
• Overview of TCP/IP• Understanding IPv4 Addressing
• Subnetting and Supernetting
• Configuring and Troubleshooting IPv4
• Identifying Appropriate Subnets
• Troubleshooting IPv4
• Implementing IPv6
• Overview of IPv6
• IPv6 Addressing
• Coexistence with IPv6
• IPv6 Transition Technologies
• Configuring an IPv6 Network
• Configuring an ISATAP Router
IP Configuration and Address Management Solution (IPAM)
Designing and Implementing DHCP• Planning and Implementing DHCP Scopes
• Planning and Implementing an IPAM Provisioning Strategy
• Designing an IP Addressing Scheme for Contoso (Optional)
• Planning DHCP to Support Your Proposed Scheme
• Planning an IPAM Deployment
• Implementing DHCP and IPAM
Implementing Advanced Network Services
• Configuring Advanced DHCP Features• Configuring Advanced DNS Settings
• Implementing IP Address Management
• Configuring Advanced DHCP Settings
• Configuring Advanced DNS Settings
• Configuring IP Address Management
Network Access Services
• Configuring Network Access• Configuring VPN Access
• Overview of Network Policies
• Troubleshooting Routing and Remote Access
• Configuring DirectAccess
• Configuring Remote Access
• Configuring the DirectAccess Infrastructure
• Configuring Direct Access Clients
• Verifying the Direct Access Configuration
• Configure Direct Access
Network Policy Server (NPS) Network Access Protection (NAP)
• Installing and Configuring a Network Policy Server• Configuring RADIUS Clients and Servers
• NPS Authentication Methods
• Monitoring and Troubleshooting a Network Policy Server
• Installing and Configuring NPS to Support RADIUS
• Configuring a RADIUS Client
• SHV Multi-configuration • Overview of Network Access Protection
• Overview of NAP Enforcement Processes
• Configuring NAP
• Monitoring and Troubleshooting NAP
• Configuring NAP Components
• Configuring the Client Settings to Support NAP
Implementing Dynamic Host Configuration Protocol (DHCP)
• Installing a DHCP Server Role• Configuring DHCP Scopes
• Managing a DHCP Database
• Securing and Monitoring DHCP
• Implementing DHCP
• Implementing a DHCP Relay (Optional Exercise)
Domain Name System (DNS)
• Name Resolution for Windows Client and Servers• Installing and Managing a DNS Server
• Managing DNS Zones
• Installing and Configuring DNS
• Creating Host Records in DNS
• Managing the DNS Server Cache
• The DNS Server Role
• Configuring the DNS Server Role
• Configuring DNS Zones
• Configuring DNS Zone Transfers
• Managing and Troubleshooting DNS
• Configuring DNS Resource Records
• Configuring DNS Conditional Forwarding
• Installing and Configuring DNS Zones
• Managing and Troubleshooting DNS
Windows 2012 Active Directory
Introduction to Active Directory Domain Services• Overview of AD DS
• Overview of Domain Controllers
• Installing a Domain Controller
• Cloning Domain Controller
• Installing Domain Controllers
• Installing a Domain Controller
• Installing a Domain Controller by Using IFM
• Managing Active Directory Domain Services Objects
• Managing User Accounts
• Managing Group Accounts
• Managing Computer Accounts
• Delegating Administration
Managing Active Directory Domain Services Objects
• Delegating Administration for a Branch Office
• Creating and Configuring User Accounts in AD DS
• Managing Computer Objects in AD DS
Automating Active Directory Domain Services Administration
• Using Command-line Tools for Administration
• Using Windows Power Shell for Administration
• Performing Bulk Operations with Windows Power Shell
Maintaining Active Directory Domain Services
• Implementing Virtualized Domain Controllers
• Implementing Read Only Domain Controllers
• Administering AD DS
• Managing the AD DS Database
• Installing and Configuring a Read Only Domain Controller
• Configuring AD DS Snapshots
• Configuring the Active Directory Recycle Bin
Managing User and Service
• Automating User Account Creation
• Configuring Password Policy and Account Lockout Settings
• Creating and Administering User Accounts
• Configuring User Object Attributes
• Configuring Managed Service Accounts
• Configuring Password Policy and Account Lockout Settings
• Creating and Associating a Managed Service Account
Automating AD DS Administration by Using Windows Power Shell• Creating User Accounts and Groups by Using Windows Power Shell
• Using Windows Power Shell to Create User Accounts in Bulk
• Using Windows Power Shell to Modify User Accounts in Bulk
Implementing Distributed Active Directory Domain Services Deployments
• Overview of Distributed AD DS Deployments
• Implementing a Distributed AD DS Environment
• Configuring AD DS Trusts
Implementing Complex AD DS Deployments
• Implementing Child Domains in AD DS
• Implementing Forest Trusts
Implementing Active Directory Domain Services Sites and Replication
• Overview of AD DS Replication
• Configuring AD DS Sites
• Configuring and Monitoring AD DS Replication
• Modifying the Default Site
• Creating Additional Sites and Subnets
• Configuring AD DS Replication
Active Directory Certificate Services
Implementing Active Directory Certificate Services
• PKI Overview
• Deploying CAs
• Deploying and Managing Certificate Templates
• Implementing Certificate Distribution and Revocation
• Managing Certificate Recovery
• Deploying a Standalone Root CA
• Deploying an Enterprise Subordinate CA
• Configuring Certificate Templates
• Configuring Certificate Enrollment
• Configuring Certificate Revocation
• Configuring Key Recovery
Active Directory Group Policy
Implementing Group Policy• Overview of Group Policy
• Group Policy Processing
• Configuring a Central Store
• Creating GPOs
• Implementing and Administering GPOs
• Managing Group Policy Scope
• Creating and Configuring Group Policy Objects
• Managing Group Policy Scope
• Verifying Group Policy Application
• Managing Group Policy Objects
• Windows Security Overview
• Configuring Security Settings
Managing User Desktops with Group Policy
• Configuring Folder Redirection and Scripts
• Configuring Group Policy Preferences
• Managing Software with Group Policy
• Implementing Settings by Using Group Policy Preferences
• Configuring Folder Redirection
Monitoring Windows Server 2012
• Monitoring Tools
• Using Performance Monitor
• Monitoring Event Logs
• Establishing a Performance Baseline
• Identifying the Source of a Performance Problem
• Viewing and Configuring Centralized Event Logs