AT Computer Solution Limited
Call Us: 01818-446835, 01711-452688

Training

Home / Training

CISCO Certifications

CCNA (Routing and Switching) New Version

CCNA (Routing and Switching) New Version

102 Hours

We have - CCNA Vendor Online Exam Center 

Book Name: CCNA Study Guide - Todd Lammle – 200-125 Edition

OR

CCNA Routing and Switching 200-125 Official Cert Guide Library

 

Chapter 1: Internetworking

  • Internetworking Basics
  • Internetworking Models
  • The OSI Reference Model

 

Chapter 2: Ethernet Networking and Data Encapsulation

  • Ethernet Networks in Review
  • Ethernet Cabling
  • Data Encapsulation
  • The Cisco Three-Layer Hierarchical Model

 

Chapter 3: Introduction to TCP/IP

  • Introducing TCP/IP
  • TCP/IP and DoD Model
  • IP Addressing
  • IPv4 Address Types

 

Chapter 4: Easy Subnetting

  • Subnetting Basics
  • Summary

 

Chapter 5: Variable Length Subnet Masks (VLSMs), Summarization and Troubleshooting TCP/IP

  • Variable Length Subnet Masks (VLSMs)
  • Summarization
  • Troubleshooting IP Addressing

 

Chapter 6: Cisco's Internetworking Operating System (IOS)

  • The IOS User Interface
  • Command-Line Interface (CLI)
  • Router and Switch Administrative Configurations
  • Router Interfaces
  • Viewing, Saving and Erasing Configurations

 

Chapter 7: Managing a Cisco Internetwork + Managing Cisco

Devices (book ICND II)

  • The Internal Components of a Cisco Router
  • The Router Boot Sequence
  • Managing Configuration Register
  • Backing Up and Restoring the Cisco IOS
  • Backing Up and Restoring the Cisco Configuration
  • Using Cisco Discovery Protocol (CDP)
  • Using Telnet
  • Resolving Hostnames
  • Checking Network Connectivity and Troubleshooting

 

Chapter 8: IP Routing

  • Routing Basics
  • The IP Routing Process
  • Configuring IP Routing in Our Network
  • Dynamic Routing
  • Distance-Vector Routing Protocols
  • Routing Information Protocol (RIP)
  • Verifying Your Configurations

 

Chapter 9: Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF)

  • EIGRP Features and Operation
  • Using EIGRP to Support Larger Networks
  • Configuring EIGRP
  • Load Balancing with EIGRP
  • Verifying EIGRP
  • Open Shortest Path First (OSPF) Basics
  • Configuring OSPF
  • Verifying OSPF Configuration
  • OSPF DR and BDR Elections
  • OSPF and Loopback Interfaces
  • Troubleshooting OSPF
  • Configuring EIGRP and OSPF Summary Routes
  • Chapter 10: Multi-Area OSPF

 

Chapter 11: Layer 2 Switching and Spanning Tree Protocol (STP)

  • Before Layer 2 Switching
  • Switching Services
  • Spanning Tree Protocol (STP)
  • Configuring Catalyst Switches

 

Chapter 12: Virtual LANs (VLANs) & InterVLAN Routing

  • VLAN Basics
  • VLAN Membership
  • Identifying VLANs
  • VLAN Trunking Protocols (VTP)
  • Routing between VLANs
  • Configuring VLANs
  • Configuring VTP
  • Telephony: Configuring Voice VLANs
  • RSTP
  • PVSTP
  • Ether Channels

Chapter 13: Security

  • Perimeter, Firewall and Internal Routers
  • Introduction to Access Lists
  • Standard Access Lists
  • Extended Access Lists
  • Turning Off and Configuring Network Services
  • Monitoring Access Lists

 

Chapter 14: Network Address Translation (NAT)

  • When Do We Use NAT?
  • Type of Network Address Translation
  • NAT Names
  • How NAT Works
  • Testing and Troubleshooting NAT

 

Chapter 15: Internet Protocol Version 6 (IPv6)

  • Why Do We Need IPv6?
  • The Benefits and Uses of IPv6
  • IPv6 Addressing and Expressions
  • How IPv6 Works in an Internetwork
  • IPv6 Routing Protocols
  • Migrating to IPv6

 

Chapter 16: IP Services

  • Client Redundancy Issues

Introducing First Hop Redundancy Protocol (FHRP)

  • Hot Standby Router Protocol (HSRP)
  • Virtual Router Redundancy Protocol
  • Syslog
  • SNMP
  • NetFlow

Chapter 17: Wide Area Networks

  • Introduction to Wide Area Networks
  • Cable and DSL
  • Cabling the Serial Wide Area Network
  • High-Level Data-Link Control (HDLC) Protocol
  • Point-to-Point Protocol (PPP)
  • Virtual Private Networks
  • GRE Tunnels

Project:  18 Hours

Exam Preparation: 24 Hours

 

If you have any query regarding the below course outline please feel free to call     01711- 452688

 


CCNP (Cisco Certified Network Professional)

CCNP Route (300-101)

Part I: Fundamental Routing Concepts

Chapter 1. Characteristics of Routing Protocols

Chapter 2. Remote Site Connectivity

 

Part II: IGP Routing Protocols

Chapter 3. IPv6 Review and RIPng

Chapter 4. Fundamental EIGRP Concepts

Chapter 5. Advanced EIGRP Concepts

Chapter 7. Fundamental OSPF Concepts

Chapter 8. The OSPF Link-State Database

Chapter 9. Advanced OSPF Concepts

 

Part III: Route Redistribution and Selection

Chapter 10. Route Redistribution

Chapter 11. Route Selection

 

Part IV: Internet Connectivity

Chapter 12. Fundamentals of Internet Connectivity

Chapter 13. Fundamental BGP Concepts

Chapter 14. Advanced BGP Concepts

Chapter 15. IPv6 Internet Connectivity

 

Part V: Router and Routing Security

Chapter 16. Fundamental Router Security Concepts

Chapter 17. Routing Protocol Authentication

 

CCNP Switch (300-115)

Part I: Designing Campus Networks

Chapter 1. Enterprise Campus Network Design

Chapter 2. Switch Operation

Chapter 3. Switch Port Configuration

 

Part II: Building a Campus Network

Chapter 4. VLANs and Trunks

Chapter 5. VLAN Trunking Protocol

 

Part III: Working with Redundant Links

Chapter 6. Traditional Spanning Tree Protocol

Chapter 7. Spanning-Tree Configuration

Chapter 8. Protecting the Spanning Tree Protocol Topology

Chapter 9. Advanced Spanning Tree Protocol

Chapter 10. Aggregating Switch Links

 

Part IV: Multilayer Switching

Chapter 11. Multilayer Switching

Chapter 12. Configuring DHCP

 

Part V: Monitoring Campus Networks

Chapter 13. Logging Switch Activity

Chapter 14. Managing Switches with SNMP

Chapter 15. Monitoring Performance with IP SLA

Chapter 16. Using Port Mirroring to Monitor Traffic

 

Part VI: Implementing High Availability

Chapter 17. Understanding High Availability

Chapter 18. Layer 3 High Availability

 

Part VII: Securing Switched Networks

Chapter 19. Securing Switch Access

Chapter 20. Securing VLANs

Chapter 21. Preventing Spoofing Attacks

Chapter 22. Managing Switch Users

 

CCNP TSHOOT (300-135)

Part I Fundamental Troubleshooting and Maintenance Concepts

Chapter 1 Introduction to Troubleshooting and Network Maintenance

Chapter 2 Troubleshooting and Maintenance Tools

Chapter 3 Troubleshooting Device Performance

 

Part II Troubleshooting Cisco Catalyst Switch Features

Chapter 4 Troubleshooting Layer 2 Trunks, VTP, and VLANs

Chapter 5 Troubleshooting STP and Layer 2 EtherChannel

Chapter 6 Troubleshooting Inter-VLAN Routing and Layer 3 EtherChannels

Chapter 7 Troubleshooting Switch Security Features

Chapter 8 Troubleshooting First-Hop Redundancy Protocols

 

Part III Troubleshooting Router Features

Chapter 9 Troubleshooting IPv4 Addressing and Addressing Technologies

Chapter 10 Troubleshooting IPv6 Addressing and Addressing Technologies

Chapter 11 Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists

Chapter 12 Troubleshooting Basic IPv4/IPv6 Routing and GRE Tunnels

Chapter 13 Troubleshooting RIPv2 and RIPng

Chapter 14 Troubleshooting EIGRP

Chapter 15 Troubleshooting OSPF

Chapter 16 Troubleshooting Route Maps and Policy-Based Routing

Chapter 17 Troubleshooting Redistribution

Chapter 18 Troubleshooting BGP

 

Part IV Troubleshooting Management

Chapter 19 Troubleshooting Management Protocols and Tools

Chapter 20 Troubleshooting Management Access

--------------------------END-----------------------------

If you have any question regarding the above course outline please call - 01711452688.


CCNA Security

Crash Course / Exam Preparation Course / 1-on-1 Course

AT Computer Solution Limited is offered Crash Course / Exam Preparation Course. It will focus on the best paths to take education to help you advance in your career. It will help you to get a professional certificate easily.

 

Advantages of 1-on-1 Training are:

  • You can start from Any Date.
  • Fully customized course to suit your training need.
  • You get a personal trainer for the entire duration of the boot camp.
  • Better quality. Quality of instruction has an inverse relation with the number of students in a class.
  • Quicker learning since you receive undivided attention of the trainer. You don't have to wait for your turn to seek an explanation

 

 

CCNA Security (New Version) & 210-260 IINS Exam

Course Outline

1. Security Concepts

  • Threatscape
  • Threat defense technologies
  • Security policy and basic security architectures
  • Cryptographic technologies

2. Secure Network Devices

  • Implementing AAA
  • Management protocols and systems
  • Securing the control plane

3. Layer 2 Security

  • Securing Layer 2 infrastructures
  • Securing Layer 2 protocols

4. Firewall

  • Firewall technologies
  • Introducing the Cisco ASA v9.2
  • Cisco ASA access control and service policies
  • Cisco IOS zone based firewall

5. VPN

  • IPsec technologies
  • Site-to-site VPN
  • Client-based remote access VPN
  • Clientless remote access VPN

6. Advanced Topics

  • Intrusion detection and protection
  • Endpoint protection
  • Content security
  • Advanced network security architectures

Labs

Lab 1: Exploring Cryptographic Technologies

Lab 2: Configure and Verify AAA

Lab 3: Configuration Management Protocols

Lab 4: Securing Routing Protocols

Lab 5: VLAN Security and ACLs on Switches

Lab 6: Port Security and Private VLAN Edge

Lab 7: Securing DHCP, ARP, and STP

Lab 8: Explore Firewall Technologies

Lab 9: Cisco ASA Interfaces and NAT

Lab 10: Site-to-Site VPN

Lab 11: Clientless Remote Access VPN

Lab 12: Configure DHCP Snooping and STP Protection

Lab 13: Configure Interfaces and NAT on the Cisco ASA


CCNP Security (Cisco Certified Network Professional Security)

CCNP Security (New Version)

Exam Number

Exam Name

1. 300-208 SISAS

Implementing Cisco Secure Access Solutions (SISAS)

2. 300-206 SENSS

Implementing Cisco Edge Network Security Solutions (SENSS)

3. 300-209 SIMOS

Implementing Cisco Secure Mobility Solutions (SIMOS)

4. 300-207 SITCS

Implementing Cisco Threat Control Solutions (SITCS)

 1. 300-208 Implementing Cisco Secure Access Solutions (SISAS)

Exam Description: The Implementing Cisco Secure Access Solutions (SISAS) (300-208) exam tests whether a network security engineer knows the components and architecture of secure access by utilizing 802.1X and Cisco TrustSec. This 90-minute exam consists of 65–75 questions. It tests on Cisco Identity Services Engine (ISE) architecture, solution, and components as an overall network threat mitigation and endpoint control solutions. It also includes the fundamental concepts of bring your own device (BYOD) using posture and profiling services of ISE. Candidates can prepare for this exam by taking the Implementing Cisco Secure Access Solutions (SISAS) course.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam.

 

1.0 Identity Management/Secure Access 

1.1 Implement device administration

1.1.a Compare and select AAA options

1.1.b TACACS+

1.1.c RADIUS

1.1.d Describe Native AD and LDAP

1.2 Describe identity management

1.2.a Describe features and functionality of authentication and authorization

1.2.b Describe identity store options (i.e., LDAP, AD, PKI, OTP, Smart Card, local)

1.2.c Implement accounting

1.3 Implement wired/wireless 802.1x

1.3.a Describe RADIUS flows

1.3.b AV pairs

1.3.c EAP types

1.3.d Describe supplicant, authenticator, server

1.3.e Supplicant options

1.3.f 802.1X phasing (monitor mode, low impact, closed mode)

1.3.g AAA server

1.3.h Network access devices

1.4 Implement MAB

1.5 Implement network authorization enforcement

1.5.a dACL

1.5.b Dynamic VLAN assignment

1.5.c Describe SGA

1.5.d Named ACL

1.5.e CoA

1.6 Implement central web authorization

1.7 Implement profiling

1.8 Implement guest services

1.9 Implement posturing

1.10 Implement BYOD access

1.10.a Describe elements of a BYOD policy

1.10.b Device registration

1.10.c My devices portal

1.10.d Describe supplicant provisioning

 

2.0 Threat Defense

2.1 Implement firewall

2.1.a Describe SGA ACLs

 

3.0 Troubleshooting, Monitoring, and Reporting Tools

3.1 Troubleshoot identity management solutions

 

4.0 Threat Defense Architectures

4.1 Design highly secure wireless solution

 

5.0 Identity Management Architectures

5.1 Design AAA security solution

5.2 Design profiling security solution

5.3 Design posturing security solution

5.4 Design BYOD security solution

5.5 Design device administration security solution

5.6 Design guest services security solution

 

2. 300-206 Implementing Cisco Edge Network Security Solutions (SENSS)

Exam Description: The Implementing Cisco Edge Network Security (SENSS) (300-206) exam tests the knowledge of a network security engineer to configure and implement security on Cisco network perimeter edge devices such as a Cisco switch, Cisco router, and Cisco ASA firewall. This 90-minute exam consists of 65-75 questions and focuses on the technologies used to strengthen security of a network perimeter such as Network Address Translation (NAT), ASA policy and application inspect, and a zone-based firewall on Cisco routers. Candidates can prepare for this exam by taking the Cisco Edge Network Security (SENSS) course.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam.

 

1.0 Threat Defense

1.1 Implement firewall

1.1.a Implement ACLs

1.1.b Implement static/dynamic NAT/PAT

1.1.c Implement object groups

1.1.d Describe threat detection features

1.1.3 Implement botnet traffic filtering

1.2 Implement Layer 2 security

1.2.a Configure DHCP snooping

1.2.b Describe dynamic ARP inspection

1.2.c Describe storm control

1.2.d Configure port security

1.2.e Describe common Layer 2 threats and attacks and mitigation

1.2.f Describe MACSec

1.3 Configure device hardening per best practices

1.3.a Routers

1.3.b Switches

  1.3.c Firewalls

1.4 Implement firewall

1.4.a Configure application filtering and protocol inspection

1.4.b Describe virtualized firewalls    

 

2.0 Cisco Security Devices GUIs and Secured CLI Management

2.1 Implement SSHv2, SSL, SNMPv3 access on the network devices

2.2 Implement RBAC on the ASA/IOS CLI and on ASDM

2.3 Describe Cisco Prime Infrastructure

2.4 Describe CSM

2.5 Implement device managers

 

3.0 Management Services on Cisco Devices

3.1 Implement NetFlow exporter

3.2 Implement SNMPv3

3.3 Implement logging

3.4 Implement NTP with authentication

3.5 Describe CDP, DNS, SCP, SFTP, and DHCP

 

4.0 Troubleshooting, Monitoring and Reporting Tools

4.1 Monitor firewall using analysis of packet tracer, packet capture, and syslog

 

5.0 Threat Defense Architectures

5.1 Design a firewall solution

5.2 Design Layer 2 security solution

 

6.0 Security Components and Considerations

6.1 Describe security operations management architecture

6.2 Describe Data Center security components and considerations

6.3 Describe Collaboration security components and considerations

6.4 Describe common IPv6 security considerations

  

3. 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS)

Exam Description: The Implementing Cisco Secure Mobility Solutions (SIMOS) (300-209) exam tests a network security engineer on the variety of Virtual Private Network (VPN) solutions that Cisco has available on the Cisco ASA firewall and Cisco IOS software platforms. This 90-minute exam consists of 65–75 questions and assesses the knowledge necessary to properly implement highly secure remote communications through VPN technology, such as remote access SSL VPN and site-to-site VPN (DMVPN, FlexVPN). Candidates can prepare for this exam by taking the Implementing Cisco Secure Mobility Solutions (SIMOS) course.

The following topics are general guidelines for the content likely to be included on the exam.

 

1.0 Secure Communications

1.1 Implement site-to-site VPNs on routers and firewalls

1.1.a Describe GETVPN

1.1.b Implement IPsec (with IKEv1 and IKEv2)

1.1.c Implement DMVPN (hub-Spoke and spoke-spoke)

1.2 Implement remote access VPNs on routers and firewalls

1.2.a Implement AnyConnect IKEv2 VPNs

1.2.b Implement SSLVPN: client and clientless

1.3 Implement site-to-site VPNs on routers and firewalls

1.3.a Implement FlexVPN

1.4 Implement remote access VPNs on routers and firewalls

1.4.a Implement SSLVPN: client and clientless

1.4.b Implement FLEX VPN

 

2.0 Troubleshooting, Monitoring, and Reporting Tools

2.1 Analyze syslog and VPN debug logs using ASDM

 

3.0 Secure Communications Architectures

3.1 Design site-to-site VPN solution

3.2 Design remote access VPN solution

3.3 Describe encryption, hashing, NGE

 

4. 300-207 Implementing Cisco Threat Control Solutions (SITCS)

Exam Description: The Implementing Cisco Threat Control Solutions (SITCS) (300-207) exam tests a network security engineer on advanced firewall architecture and configuration with the Cisco next-generation firewall, utilizing access and identity policies. This 90-minute exam consists of 65–75 questions and covers integration of Intrusion Prevention System (IPS) and context-aware firewall components, as well as Web (Cloud) and Email Security solutions. Candidates can prepare for this exam by taking the Implementing Cisco Threat Control Solutions (SITCS) course.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam.

 

1.0 Content Security

1.1 Implement Cisco CX

1.1.a Describe features and functionality

1.1.b Implement web usage control

1.1.c Implement AVC

1.1.d Implement decryption policies

1.1.e Describe traffic redirection and capture methods

1.2 Implement Cisco Cloud Web Security

1.2.a Describe features and functionality

1.2.b Implement IOS and ASA connectors

1.2.c Implement AnyConnect web security module

1.2.d Describe web usage control

1.2.e Describe AVC

1.2.f Describe anti-malware

1.2.g Describe decryption policies

1.3 Implement Cisco WSA

1.3.a Implement data security

1.3.b Describe traffic redirection and capture methods

1.4 Implement Cisco ESA

1.4.a Describe features and functionality

1.4.b Implement email encryption

1.4.c Implement anti-spam policies

1.4.d Implement virus outbreak filter

1.4.e Implement DLP policies

1.4.f Implement anti-malware                

1.4.g Implement inbound and outbound mail policies and authentication

1.4.h Describe traffic redirection and capture methods

 

2.0 Threat Defense

2.1 Implement network IPS

2.1.a Describe traffic redirection and capture methods

2.1.b Configure network IPS

2.1.c Describe signatures

2.1.d Implement event actions

2.1.e Configure event action overrides

2.1.f Implement risk ratings

2.1.g Describe router-based IPS

2.2 Configure device hardening per best practices

2.2.a IPS

2.2.b Content Security appliances

2.3 Implement Network IPS

2.3.a Describe signatures

2.3.b Configure blocking

2.3.c Implement anomaly detection

 

3.0 Devices GUIs and Secured CLI

3.1 Implement Content Security

 

4.0 Troubleshooting, Monitoring, and Reporting Tools

4.1 Configure IME and IP logging for IPS

4.2 Monitor Content Security

4.3 Monitor Cisco Security IntelliShield

 

5.0 Threat Defense Architectures

5.1 Design IPS solution

 

6.0 Content Security Architectures

6.1 Design Web Security solution

6.2 Design Email Security solution

6.3 Design Application Security solution

 

We assure your best learning. If you have any quire please feel free to call # +88 01711-452688


CCNA Data Center

CCNA Data Center

 

1. 640-911 DCICN   Introducing Cisco Data Center Networking (DCICN)

Course Outline

  • Module 1: Building a Simple Network (7 lessons)
  • Module 2: Implementing a Switched Network (6 lessons)
  • Module 3: IP Addressing (4 lessons)
  • Module 4: Routing on the Cisco Nexus Switch (4 lessons)

 

2. 640-916 DCICT   Introducing Cisco Data Center Technologies (DCICT)

 Course Outline

  • Module 1: Cisco Data Center Fundamentals Concepts (11 lessons)
  • Module 2: Data Center Unified Fabric (5 lessons)
  • Module 3: Storage Networking (8 lessons)
  • Module 4: DC Virtualization (4 lessons)
  • Module 5: Unified Computing (7 lessons)

 

For more details visit:

http://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna-data-center.html


CCIE Routing and Switching

1.0  Layer 2 Technologies

1.1  LAN switching technologies

 1.1.a  Implement and troubleshoot switch administration

1.1.a (i)  Managing MAC address table

1.1.a (ii)    errdisable recovery

1.1.a (iii)  L2 MTU

1.1.b   Implement and troubleshoot layer 2 protocols

1.1.b (i)  CDP, LLDP

1.1.b (ii)  UDLD

1.1.c   Implement and troubleshoot VLAN

1.1.c (i)  access ports

1.1.c (ii)  VLAN database

1.1.c (iii)  normal, extended VLAN, voice VLAN

1.1.d   Implement and troubleshoot trunking

1.1.d (i)  VTPv1, VTPv2, VTPv3, VTP pruning

1.1.d (ii)  dot1Q

1.1.d (iii)  Native VLAN

1.1.d (iv)  Manual pruning

1.1.e   Implement and troubleshoot etherchannel

1.1.e (i)  LACP, PAgP, manual

1.1.e (ii)  layer 2, layer 3

1.1.e (iii)  load-balancing

1.1.e (iv)  etherchannel misconfiguration guard

1.1.f  Implement and troubleshoot spanning-tree

1.1.f (i)  PVST+/RPVST+/MST

1.1.f (ii)  switch priority, port priority, path cost, STP timers

1.1.f (iii)  port fast, BPDUguard, BPDUfilter

1.1.f (iv)  loopguard, rootguard

1.1.g   Implement and troubleshoot other LAN switching technologies

1.1.g (i)  SPAN, RSPAN, ERSPAN

 

1.2  Layer 2 Multicast

1.2.a  Implement and troubleshoot IGMP

1.2.a (I)  IGMPv1, IGMPv2, IGMPv3

1.2.a (ii)  IGMP snooping

1.2.a (iii)  IGMP querier

1.2.a (iv)  IGMP filter

1.2.a (v)  IGMP proxy

 

1.3  Layer 2 WAN circuit technologies

1.3.a  Implement and troubleshoot HDLC

1.3.b  Implement and troubleshoot PPP

1.3.b (i)  authentication (PAP, CHAP)

1.3.b (ii)  PPPoE

1.3.b (iii)  MLPPP

 

1.4  Troubleshooting layer 2 technologies

1.4.a  Use IOS troubleshooting tools

1.4.a (i)  debug, conditional debug

1.4.a (ii)  ping, traceroute with extended options

1.4.a (iii)  Embedded packet capture

1.4.b  Apply troubleshooting methodologies

1.4.b (i)  Diagnose the root cause of networking issue (analyze symptoms,

                                                            identify and describe root cause)

1.4.b (ii)  Design and implement valid solutions according to constraints

1.4.b (iii)  Verify and monitor resolution

1.4.c  Interpret packet capture

1.4.c (i)  Using wireshark trace analyzer

1.4.c (ii)  Using IOS embedded packet capture

 

40%  2.0  Layer 3 Technologies

2.1  Addressing technologies

2.1.a  Identify, implement and troubleshoot IPv4 addressing and sub-netting

2.1.a (i)  Address types, VLSM

2.1.a (ii)  ARP

2.1.b  Identify, implement and troubleshoot IPv6 addressing and sub-netting

2.1.b (i)  Unicast, multicast

2.1.b (ii)  EUI-64

2.1.b (iii)  ND, RS/RA

2.1.b (iv)  Autoconfig/SLAAC temporary addresses (RFC4941)

2.1.b (v)  Global prefix configuration feature

 

2.2  Layer 3 Multicast

2.2.a  Troubleshoot reverse path forwarding

2.2.a (i)  RPF failure

2.2.a(ii)  RPF failure with tunnel interface 

2.2.b  Implement and troubleshoot IPv4 protocol independent multicast

2.2.b (i)  PIM dense mode, sparse mode, sparse-dense mode

2.2.b (ii)  Static RP, auto-RP, BSR

2.2.b (iii)  Bidirectional PIM

2.2.b (iv)  Source-specific multicast

2.2.b (v)  Group to RP mapping

2.2.b (vi)  Multicast boundary

2.2.c  Implement and troubleshoot multicast source discovery protocol

2.2.c.(i)  Intra-domain MSDP (anycast RP)

2.2.c.(ii)  SA filter

 

2.3  Fundamental routing concepts

2.3.a  Implement and troubleshoot static routing

2.3.b  Implement and troubleshoot default routing

2.3.c  Compare routing protocol types

2.3.c (i)  distance vector

2.3.c (ii)  link state

2.3.c (iii)  path vector

2.3.d  Implement, optimize and troubleshoot administrative distance

2.3.e  Implement and troubleshoot passive interface

2.3.f  Implement and troubleshoot VRF lite

2.3.g  Implement, optimize and troubleshoot filtering with any routing protocol

2.3.h  Implement, optimize and troubleshoot redistribution between any routing

                                      protocol

2.3.i  Implement, optimize and troubleshoot manual and auto summarization                              with  any routing protocol

2.3.j  Implement, optimize and troubleshoot policy-based routing

2.3.k  Identify and troubleshoot sub-optimal routing

2.3.l  Implement and troubleshoot bidirectional forwarding detection

2.3.m  Implement and troubleshoot loop prevention mechanisms

2.3.m (i)  Route tagging, filtering

2.3.m (ii)  Split horizon

2.3.m (iii)  Route poisoning

2.3.n  Implement and troubleshoot routing protocol authentication

2.3.n (i)  MD5

2.3.n (ii)  key-chain

2.3.n (iii)  EIGRP HMAC SHA2-256bit

2.3.n (iv)  OSPFv2 SHA1-196bit

2.3.n (v)  OSPFv3 IPsec authentication

 

 

2.4  RIP v2

2.4.a  Implement and troubleshoot RIPv2

 

2.5  EIGRP (for IPv4 and IPv6)

2.5.a  Describe packet types

2.5.a (i)  Packet types (hello, query, update, and such)

2.5.a (ii)  Route types (internal, external)

2.5.b  Implement and troubleshoot neighbor relationship

2.5.b (i)  Multicast, unicast EIGRP peering

2.5.c  Implement and Troubleshoot Loop free path selection

2.5.c (i)  RD, FD, FC, successor, feasible successor

2.5.c (ii)  Classic metric

2.5.c (iii)  Wide metric

2.5.d  Implement and troubleshoot operations

2.5.d (i)  General operations

2.5.d (ii)  Topology table, update, query, active, passive

2.5.d (iii)  Stuck in active

2.5.d (iv)  Graceful shutdown

2.5.e  Implement and troubleshoot EIGRP stub

2.5.e (i)  stub

2.5.e (ii)  leak-map

2.5.f  Implement and troubleshoot load-balancing

2.5.f (i)  equal-cost

2.5.f (ii)  unequal-cost

2.5.f (iii)  add-path

2.5.g  Implement EIGRP (multi-address) named mode

2.5.g (i)  Types of families

2.5.g (ii)  IPv4 address-family

2.5.g (iii)  IPv6 address-family

2.5.h  Implement, troubleshoot and optimize EIGRP convergence and scalability

2.5.h (i)  Describe fast convergence requirements

2.5.h (ii)  Control query boundaries

2.5.h (iii)  IP FRR/fast reroute (single hop)

2.5.h (iv)  Summary leak-map

2.5.h (v)  Summary metric

 

2.6  OSPF (v2 and v3)

2.6.a  Describe packet types

2.6.a (i)  LSA types (1, 2, 3, 4, 5, 7, 9)

2.6.a (ii)  Route types (N1, N2, E1, E2)

2.6.b  Implement and troubleshoot neighbor relationship

2.6.c  Implement and troubleshoot OSPFv3 address-family support

2.6.c (i)  IPv4 address-family

2.6.c (ii)  IPv6 address-family

2.6.d  Implement and troubleshoot network types, area types and router types

2.6.d (i)  Point-to-point, multipoint, broadcast, non-broadcast

              2.6.d (ii)  LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub

2.6.d (iii)  Internal router, ABR, ASBR

2.6.d (iv)  Virtual link

2.6.e  Implement and troubleshoot path preference

2.6.f  Implement and troubleshoot operations

2.6.f (i)  General operations

2.6.f (ii)  Graceful shutdown

2.6.f (iii)  GTSM (generic TTL security mechanism)

2.6.g  Implement, troubleshoot and optimize OSPF convergence and scalability

2.6.g (i)  Metrics

2.6.g (ii)  LSA throttling, SPF tuning, fast hello

2.6.g (iii)  LSA propagation control (area types, ISPF)

2.6.g (iv)  IP FR/fast reroute (single hop)

2.6.g (v)  LFA/loop-free alternative (multi hop)

2.6.g (vi)  OSPFv3 prefix suppression

 

2.7  BGP

2.7.a  Describe, implement and troubleshoot peer relationships

2.7.a (i)  Peer-group, template

2.7.a (ii)  Active, passive

2.7.a (iii)  States, timers

2.7.a (iv)  Dynamic neighbors

2.7.b  Implement and troubleshoot IBGP and EBGP

2.7.b (i)  EBGP, IBGP

2.7.b (ii)  4 bytes AS number

2.7.b (iii)  Private AS

2.7.c  Explain attributes and best-path selection

2.7.d  Implement, optimize and troubleshoot routing policies

2.7.d (i)  Attribute manipulation

2.7.d (ii)  Conditional advertisement

2.7.d (iii)  Outbound route filtering

2.7.d (iv)  Communities, extended communities

2.7.d (v)  Multi-homing

2.7.e  Implement and troubleshoot scalability

2.7.e (i)  Route-reflector, cluster

2.7.e (ii)  Confederations

2.7.e (iii)  Aggregation, AS set

2.7.f  Implement and troubleshoot multi-protocol BGP

2.7.f (i)  IPv4, IPv6, VPN address-family

2.7.g  Implement and troubleshoot AS path manipulations

2.7.g (i)  Local AS, allow AS in, remove private AS

2.7.g (ii)  Prepend

2.7.g (iii)  Regexp

2.7.h  Implement and Troubleshoot Other Features

2.7.h (i)  Multipath

2.7.h (ii)  BGP synchronization

2.7.h (iii)  Soft reconfiguration, route refresh

 

2.8  Troubleshooting layer 3 technologies

2.8.a  Use IOS troubleshooting tools

2.8.a (i)  debug, conditional debug

2.8.a (ii)  ping, traceroute with extended options

2.8.a (iii)  Embedded packet capture

2.8.b  Apply troubleshooting methodologies

2.8.b (i)  Diagnose the root cause of networking issue (analyze symptoms,

                                                            identify and describe root cause)

2.8.b (ii)  Design and implement valid solutions according to constraints

2.8.b (iii)  Verify and monitor resolution

2.8.c  Interpret packet capture

2.8.c (i)  Using wireshark trace analyzer

2.8.c (ii)  Using IOS embedded packet capture

 

20%  3.0  VPN Technologies

3.1  Tunneling

3.1.a  Implement and troubleshoot MPLS operations

3.1.a (i)  Label stack, LSR, LSP

3.1.a (ii)  LDP

3.1.a (iii)  MPLS ping, MPLS traceroute

3.1.b  Implement and troubleshoot basic MPLS L3VPN

3.1.b (i)  L3VPN, CE, PE, P

3.1.b (ii)  Extranet (route leaking)

3.1.c  Implement and troubleshoot encapsulation

3.1.c (i)  GRE

3.1.c (ii)  Dynamic GRE

3.1.d  Implement and troubleshoot DMVPN (single hub)

3.1.d (i)  NHRP

3.1.d (ii)  DMVPN with IPsec using preshared key

3.1.d (iii)  QoS profile

3.1.d (iv)  Pre-classify

 

3.2  Encryption

3.2.a  Implement and troubleshoot IPsec with preshared key

3.2.a (i)  IPv4 site to IPv4 site

3.2.a (ii)  IPv6 in IPv4 tunnels

3.2.a (iii)  Virtual tunneling interface (VTI)

 

3.3  Troubleshooting VPN technologies

3.3.a  Use IOS troubleshooting tools

3.3.a (i)  debug, conditional debug

3.3.a (ii)  ping, traceroute with extended options

3.3.a (iii)  Embedded packet capture

3.3.b  Apply troubleshooting methodologies

3.3.b (i)  Diagnose the root cause of networking issue (analyze symptoms,

                                                            identify and describe root cause)

3.3.b (ii)  Design and implement valid solutions according to constraints

3.3.b (iii)  Verify and monitor resolution

3.3.c  Interpret packet capture

3.3.c (i)  Using wireshark trace analyzer

3.3.c (ii)  Using IOS embedded packet capture

 

5%  4.0  Infrastructure Security

4.1  Device security

4.1.a  Implement and troubleshoot IOS AAA using local database

4.1.b  Implement and troubleshoot device access control 

4.1.b (i)  Lines (VTY, AUX, console)

4.1.b (ii)  SNMP

4.1.b (iii)  Management plane protection

4.1.b (iv)  Password encryption

4.1.c  Implement and troubleshoot control plane policing

 

4.2  Network security

4.2.a  Implement and troubleshoot switch security features

4.2.a (i)  VACL, PACL

4.2.a (ii)  Stormcontrol

4.2.a (iii)  DHCP snooping

4.2.a (iv)  IP source-guard

4.2.a (v)  Dynamic ARP inspection

4.2.a (vi)  Port-security

4.2.a (vii)  Private VLAN

4.2.b  Implement and troubleshoot router security features

4.2.b (i)  IPv4 access control lists (standard, extended, time-based)

4.2.b (ii)  IPv6 traffic filter

4.2.b (iii)  Unicast reverse path forwarding

4.2.c  Implement and troubleshoot IPv6 first hop security

4.2.c (i)  RA guard

4.2.c (ii)  DHCP guard

4.2.c (iii)  Binding table

4.2.c (iv)  Device tracking

4.2.c (v)  ND inspection/snooping

4.2.c (vi)  Source guard

4.2.c (vii)  PACL

 

4.3  Troubleshooting infrastructure security

4.3.a  Use IOS troubleshooting tools

4.3.a (i)  debug, conditional debug

4.3.a (ii)  ping, traceroute with extended options

4.3.a (iii)  Embedded packet capture

4.3.b  Apply troubleshooting methodologies

4.3.b (i)  Diagnose the root cause of networking issue (analyze symptoms,

                                                           identify and describe root cause)

4.3.b (ii)  Design and implement valid solutions according to constraints

4.3.b (iii)  Verify and monitor resolution

4.3.c  Interpret packet capture

4.3.c (i)  Using wireshark trace analyzer

4.3.c (ii)  Using IOS embedded packet capture

 

15%  5.0  Infrastructure Services

5.1  System management

5.1.a  Implement and troubleshoot device management

5.1.a (i)  Console and VTY

5.1.a (ii)  telnet, HTTP, HTTPS, SSH, SCP

5.1.a (iii)  (T)FTP

5.1.b  Implement and troubleshoot SNMP

5.1.b (i)  v2c, v3

5.1.c  Implement and troubleshoot logging

5.1.c (i)  Local logging, syslog, debug, conditional debug

5.1.c (ii)  Timestamp

 

5.2  Quality of service

5.2.a  Implement and troubleshoot end to end QoS

5.2.a (i)  CoS and DSCP mapping

5.2.b  Implement, optimize and troubleshoot QoS using MQC

5.2.b (i)  Classification

5.2.b (ii)  Network based application recognition (NBAR)

5.2.b (iii)  Marking using IP precedence, DSCP, CoS, ECN

5.2.b (iv)  Policing, shaping

5.2.b (v)  Congestion management (queuing)

5.2.b (vi)  HQoS, sub-rate ethernet link

5.2.b (vii)  Congestion avoidance (WRED)

 

5.3  Network services

5.3.a  Implement and troubleshoot first-hop redundancy protocols

5.3.a (i)  HSRP, GLBP, VRRP

5.3.a (ii)  Redundancy using IPv6 RS/RA

5.3.b  Implement and troubleshoot network time protocol

5.3.b (i)  NTP master, client, version 3, version 4

5.3.b (ii)  NTP authentication

5.3.c  Implement and troubleshoot IPv4 and IPv6 DHCP

5.3.c (i)  DHCP client, IOS DHCP server, DHCP relay

5.3.c (ii)  DHCP options

5.3.c (iii)  DHCP protocol operations

5.3.c (iv)  SLAAC/DHCPv6 interaction

5.3.c (v)  Stateful, stateless DHCPv6

5.3.c (vi)  DHCPv6 prefix delegation

5.3.d  Implement and troubleshoot IPv4 network address translation

5.3.d (i)  Static NAT, dynamic NAT, policy-based NAT, PAT

5.3.d (ii)  NAT ALG

 

5.4  Network optimization

5.4.a  Implement and troubleshoot IP SLA

5.4.a (i)  ICMP, UDP, jitter, VoIP

5.4.b  Implement and troubleshoot tracking object

5.4.b (i)  Tracking object, tracking list

5.4.b (ii)  Tracking different entities (e.g. interfaces, routes, IPSLA, and such)

5.4.c  Implement and troubleshoot netflow

5.4.c (i)  Netflow v5, v9

5.4.c (ii)  Local retrieval

5.4.c (iii)  Export (configuration only)

5.4.d  Implement and troubleshoot embedded event manager

5.4.d (i)  EEM policy using applet

 

5.5  Troubleshooting infrastructure services

5.5.a  Use IOS troubleshooting tools

5.5.a (i)  debug, conditional debug

5.5.a (ii)  ping, traceroute with extended options

5.5.a (iii)  Embedded packet capture

5.5.b  Apply troubleshooting methodologies

5.5.b (i)  Diagnose the root cause of networking issue (analyze symptoms,

                                                           identify and describe root cause)

5.5.b (ii)  Design and implement valid solutions according to constraints

5.5.b (iii)  Verify and monitor resolution

5.5.c  Interpret packet capture

5.5.c (i)  Using wireshark trace analyzer

5.5.c (ii)  Using IOS embedded packet capture


RedHat Enterprise Linux

Red Hat Certified Engineer (RHCE)

We are -  Authorized RedHat Linux Training & Exam Partner in Bangladesh

Click  =  http://www.redhat.com/en/services/training/locations-facilities

 

RHCE Course Outline

Total 110 Hours

Per Class 06 Hours

One Class = 06 Hours Friday Evening Batch (3:30pm-9:30pm) /

                    Friday Morning 4 hours (9am – 1pm) & Saturday Evening 2 hours (7:30pm-9:30pm)

Red Hat System Administration I (RH124)

Chapter 1 : Accessing the Command Line

Chapter 2: Managing Files From the Command Line

Chapter 3: Getting Help in Red Hat Enterprise Linux [Without LAB]

Chapter 4: Creating, Viewing, and Editing Text Files

ONE Class

 

Chapter 5: Managing Local Linux Users and Groups

Chapter 6: Controlling Access to Files With Linux File System Permission

Chapter 8: Controlling Services and Daemons

Chapter 11: Managing Red Hat Enterprise Linux Networking

ONE Class

 

Chapter 9: Configuring and Securing OpenSSH Service

Chapter 12: Archiving and Copying Files Between Systems

Chapter 13: Installing and Updating Software Packages

Chapter 14: Accessing Linux file Systems

ONE Class

*** Exam Class

Red Hat System Administration II (RH134)

Chapter 2 : Using Regular Expression With grep

Chapter 3 : Creating and Editing Text files with vim

Chapter 4 : Scheduling Future Linux Tasks

Chapter  6: Controlling Access to Files With Access Control lists (ACLs)

Chapter 7 : Managing SELinux Security

ONE Class

 

Chapter 8: Connecting to Network-defined Users and Groups

Chapter 9: Adding Disks, Partitions, and File System to a Linux System

Chapter 10: Managing Logical Volume Management (LVM) Storage

ONE Class

 

Chapter 11: Accessing Network Storage with Network File System (NFS)

Chapter 13: Controlling and Troubleshooting the Red Hat  Enterprise Linux Boot Process

Chapter 14: Limiting Network Communication with firewalld

ONE Class

*** Exam Class

Red Hat System Administration III (RH254)

Chapter 1: Controlling Services and Daemons

Chapter 2: Managing IPv6 Networking

Chapter 3: Configuring Link Aggregation and Bridging

ONE Class

 

Chapter 4: Network Port Security

Chapter 5: Managing DNS for Servers

Chapter 6: Configuring Email Transmission

Chapter 7: Providing Remote Block Storage

ONE Class

*** Exam Class

Chapter 8: Providing File-based Storage

Chapter 9: Configuring MariaDB Databases

Chapter 10: Providing Apache HTTPD Web Service

ONE Class

 

Chapter 11:Writing Bash Scripts

Chapter 12: Bash Conditionals and Control Structures

Chapter 13: Configuring the Shell Environment

ONE Class

*** Exam Class

 

Exam Preparation:   20 Hours

Project:   18 Hours

=> Special discount for Linux RHCE 7 Course fee TK 7000 + 3 Original Books TK 8000 = 15,000 (110 Hours)

 

If you have any query please feel free call - 01711452688

 

 


Red Hat Certified Architect (RHCA)

We are -  Authorized RedHat Linux Training & Exam Partner in Bangladesh

Click  =  http://www.redhat.com/en/services/training/locations-facilities

 

RHCE Course Outline

Total 110 Hours

Per Class 06 Hours

One Class = 06 Hours Friday Evening Batch (3:30pm-9:30pm) /

                    Friday Morning 4 hours (9am – 1pm) & Saturday Evening 2 hours (7:30pm-9:30pm)

Red Hat System Administration I (RH124)

Chapter 1 : Accessing the Command Line

Chapter 2: Managing Files From the Command Line

Chapter 3: Getting Help in Red Hat Enterprise Linux [Without LAB]

Chapter 4: Creating, Viewing, and Editing Text Files

ONE Class

 

Chapter 5: Managing Local Linux Users and Groups

Chapter 6: Controlling Access to Files With Linux File System Permission

Chapter 8: Controlling Services and Daemons

Chapter 11: Managing Red Hat Enterprise Linux Networking

ONE Class

 

Chapter 9: Configuring and Securing OpenSSH Service

Chapter 12: Archiving and Copying Files Between Systems

Chapter 13: Installing and Updating Software Packages

Chapter 14: Accessing Linux file Systems

ONE Class

*** Exam Class

Red Hat System Administration II (RH134)

Chapter 2 : Using Regular Expression With grep

Chapter 3 : Creating and Editing Text files with vim

Chapter 4 : Scheduling Future Linux Tasks

Chapter  6: Controlling Access to Files With Access Control lists (ACLs)

Chapter 7 : Managing SELinux Security

ONE Class

 

Chapter 8: Connecting to Network-defined Users and Groups

Chapter 9: Adding Disks, Partitions, and File System to a Linux System

Chapter 10: Managing Logical Volume Management (LVM) Storage

ONE Class

 

Chapter 11: Accessing Network Storage with Network File System (NFS)

Chapter 13: Controlling and Troubleshooting the Red Hat  Enterprise Linux Boot Process

Chapter 14: Limiting Network Communication with firewalld

ONE Class

*** Exam Class

Red Hat System Administration III (RH254)

Chapter 1: Controlling Services and Daemons

Chapter 2: Managing IPv6 Networking

Chapter 3: Configuring Link Aggregation and Bridging

ONE Class

 

Chapter 4: Network Port Security

Chapter 5: Managing DNS for Servers

Chapter 6: Configuring Email Transmission

Chapter 7: Providing Remote Block Storage

ONE Class

*** Exam Class

Chapter 8: Providing File-based Storage

Chapter 9: Configuring MariaDB Databases

Chapter 10: Providing Apache HTTPD Web Service

ONE Class

 

Chapter 11:Writing Bash Scripts

Chapter 12: Bash Conditionals and Control Structures

Chapter 13: Configuring the Shell Environment

ONE Class

*** Exam Class

Exam Preparation:   20 Hours

Project:   18 Hours

=> Special discount for Linux RHCE 7 Course fee TK 9,500 + 3 Original Books TK 6000 = 15,500 (110 Hours)

 

 

If you have any query please feel free call - 01711452688


Red Hat Enterprise Virtualization (RH318)

Course Content

  • Install Red Hat Enterprise Virtualization Manager and any dependencies
  • Use Red Hat Enterprise Virtualization Manager to:
    • Create datacenters and clusters
    • Manage hypervisor hosts
    • Configure storage
    • Create Red Hat Enterprise Linux virtual machines
    • Develop pools and templates
    • Set up Red Hat Enterprise Virtualization Manager users
  • Install and configure a Red Hat Virtualization Hypervisor to support guests and attach to a Red Hat Enterprise Virtualization Manager
  • Import installation media for creating new virtual machines
  • Perform management tasks, such as collecting logs, creating bookmarks for specific events, and more

 


Red Hat Gluster Storage Administration (RH236)

Course Outline

  • Install Red Hat Storage Server on both physical and virtual systems and work with existing Red Hat Storage Server appliances
  • Configure a Red Hat Storage Server storage pool
  • Create individual storage bricks on either physical devices or logical volumes
  • Create various Red Hat Storage Server volumes such as:
    • Distributed
    • Replicated
    • Distributed-replicated
    • Stripe-replicated
    • Distributed-striped
    • Distributed-striped-replicated
  • Format the volumes with an appropriate file system
  • Create Red Hat Storage Server volume snapshots
  • Extend existing storage volumes by adding additional bricks and performing appropriate rebalancing operations
  • Configure clients to use Red Hat Storage Server appliance volumes using native and network file systems (NFS)
  • Configure clients to use Red Hat Storage Server appliance volumes using SMB
  • Configure Red Hat Storage Server features including disk quotas and POSIX access control lists (ACLs)
  • Configure IP failover for NFS-and SMB-based cluster services
  • Configure geo-replication services
  • Configure unified object storage
  • Configure Red Hat Storage Server to support Hadoop
  • Troubleshoot Red Hat Storage Server problems
  • Monitor Red Hat Storage Server workloads
  • Perform Red Hat Storage Server management tasks such as tuning volume options, volume migration, stopping and deleting volumes, and configuring server-side quorum

 


Red Hat High Availability Clustering (RH436)

Candidates should be able to perform the tasks listed below:

  • Configure a high-availability cluster, using either physical or virtual systems, that:
    • Utilizes shared storage.
    • Provides service fail-over between the cluster nodes.
    • Provides preferred node for a given service.
    • Selectively fails over services based on specific constraints.
    • Preemptively removes non-functioning cluster members to prevent corruption of shared storage.
  • Manage logical volumes in a clustered environment:
    • Create volume groups that are available to all members of a highly available cluster.
    • Create logical volumes that can be simultaneously mounted by all members of a high-availability cluster.
  • Configure a GFS file system to meet specified size, layout, and performance objectives.
  • Configure iSCSI initiators.
  • Use multipathed devices.
  • Configure cluster logging.
  • Configure cluster monitoring.

As with all Red Hat performance-based exams, configurations must persist after reboot without intervention.

 


Red Hat OpenStack Administration (CL210)

Course outline

Candidates for the RHCSA in Red Hat OpenStack should be able to perform the following tasks:

  • Install and configure Red Hat Enterprise Linux OpenStack Platform
  • Manage users
  • Manage projects
  • Manage flavors
  • Manage roles
  • Set quotas
  • Manage images
  • Configure images at instantiation
  • Add additional compute nodes
  • Manage Swift storage
  • Manage networking
  • Manage Cinder storage

 


Red Hat Server Hardening (RH413)

Course Outline

Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks:

  • Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information
  • Verify package security and validity
  • Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes
  • Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files
  • Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files
  • Manage user account security and user password security
  • Manage system login security using pluggable authentication modules (PAM)
  • Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords
  • Configure system-wide acceptable use notifications
  • Install, configure, and manage identity management services and configure identity management clients
  • Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression
  • Configure system auditing services and review audit reports
  • Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling

As with all Red Hat performance-based exams, configurations must persist after reboot without intervention.

 


Microsoft MCSA/MCSE

Installation, Storage, and Compute with Windows Server 2016

Installation, Storage, and Compute with Windows Server 2016

Course Outline
 

Module 1: Installing, upgrading, and migrating servers and workloadsThis module describes the new features of Windows Server 2016, and explains how to prepare for and install Nano Server and Server Core. This module also describes how to plan a server upgrade and migration strategy, and explains how to perform a migration of server roles and workloads within and across domains. Finally, this module explains how to choose an activation model based on your environment characteristics.Lessons

  • Introducing Windows Server 2016
  • Preparing and installing Nano Server and Server Core
  • Preparing for upgrades and migrations
  • Migrating server roles and workloads
  • Windows Server activation models
Lab : Installing and configuring Nano Server
  • Installing Nano Server
  • Completing post-installation tasks on Nano Server
  • Performing remote management

After completing this module, students will be able to:

  • Describe the new features of Windows Server 2016.
  • Prepare for and install Nano Server and Server Core.
  • Plan a server upgrade and migration strategy.
  • Perform a migration of server roles and workloads within a domain and across domains.
  • Choose an activation model.
Module 2: Configuring local storageThis module explains how to manage disks and volumes in Windows Server 2016.Lessons
  • Managing disks in Windows Server
  • Managing volumes in Windows Server
Lab : Configuring local storage
  • Creating and managing volumes
  • Resizing volumes
  • Managing virtual hard disks

After completing this module, students will be able to:

  • Manage disks in Windows Server.
  • Manage volumes in Windows Server.
Module 3: Implementing enterprise storage solutionsThis module discusses direct-attached storage (DAS), network-attached storage (NAS), and storage area networks (SANs). It also explains the purpose of Microsoft Internet Storage Name Service (iSNS) Server, data center bridging (DCB), and Multipath I/O (MPIO). Additionally, this module compares Fibre Channel, Internet Small Computer System Interface (iSCSI), and Fibre Channel over Ethernet (FCoE), and describes how to configure sharing in Windows Server 2016.Lessons
  • Overview of DAS, NAS, and SANs
  • Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet
  • Understanding iSNS, DCB, and MPIO
  • Configuring sharing in Windows Server 2016
Lab : Planning and configuring storage technologies and components
  • Planning storage requirements
  • Configuring iSCSI storage
  • Configuring and managing the share infrastructure

After completing this module, students will be able to:

  • Describe DAS, NAS, and SANs.
  • Compare Fibre Channel iSCSI, and FCoE.
  • Explain the use of iSNS, DCB, and MPIO.
  • Configure sharing in Windows Server.

Module 4: Implementing Storage Spaces and Data DeduplicationThis module explains how to implement and manage Storage Spaces. This module also explains how to implement Data Deduplication.Lessons

  • Implementing Storage Spaces
  • Managing Storage Spaces
  • Implementing Data Deduplication
Lab : Implementing Storage Spaces
  • Creating a Storage Space
Lab : Implementing Data Deduplication
  • Installing Data Deduplication
  • Configuring Data Deduplication

After completing this module, students will be able to:

  • Describe and implement the Storage Spaces feature in the context of enterprise storage needs.
  • Manage and maintain Storage Spaces.
  • Describe and implement Data Deduplication.
Module 5: Installing and configuring Hyper-V and virtual machinesThis module provides an overview of Hyper-V and virtualization. It explains how to install Hyper-V, and how to configure storage and networking on Hyper-V host servers. Additionally, it explains how to configure and manage Hyper-V virtual machines.Lessons
  • Overview of Hyper-V
  • Installing Hyper-V
  • Configuring storage on Hyper-V host servers
  • Configuring networking on Hyper-V host servers
  • Configuring Hyper-V virtual machines
  • Managing virtual machines
Lab : Installing and configuring Hyper-V
  • Verify installattion of the Hyper-V server role
  • Configuring Hyper-V networks
  • Creating and configuring a virtual machines
  • Enable nested virtualization for a virtual machine

After completing this module, students will be able to:

  • Describe Hyper-V and virtualization.
  • Install Hyper-V.
  • Configure storage on Hyper-V host servers.
  • Configure networking on Hyper-V host servers.
  • Configure Hyper-V virtual machines.
  • Manage Hyper-V virtual machines.
Module 6: Deploying and managing Windows and Hyper-V containersThis module provides and overview of containers in Windows Server 2016. Additionally, this module explains how to deploy Windows Server and Hyper-V containers. It also explains how to install, configure, and manage containers by using Docker.Lessons
  • Overview of containers in Windows Server 2016
  • Deploying Windows Server and Hyper-V containers
  • Installing, configuring, and managing containers by using Docker
Lab : Installing and configuring containers
  • Installing and configuring Windows Server containers by using Windows PowerShell
  • Installing and configuring Windows Server containers by using Docker Installing

After completing this module, students will be able to:

  • Describe containers in Windows Server 2016.
  • Explain how to deploy containers.
  • Explain how to install, configure, and manage containers using Docker.
Module 7: Overview of high availability and disaster recoveryThis module provides an overview of high availability and high availability with failover clustering in Windows Server 2016. It further explains how to plan high availability and disaster recovery solutions with Hyper-V virtual machines. Additionally, this module explains how to back up and restore the Windows Server 2016 operating system and data by using Windows Server Backup.Lessons
  • Defining levels of availability
  • Planning high availability and disaster recovery solutions with Hyper-V virtual machines
  • Backing up and restoring by using Windows Server Backup
  • High availability with failover clustering in Windows Server 2016
Lab : Planning and implementing a high availability and disaster recovery solution
  • Determining the appropriate high availability and disaster recovery solution
  • Implementing storage migration
  • Configuring Hyper-V replicas

After completing this module, students will be able to:

  • Describe levels of availability.
  • Plan for high availability and disaster recovery solutions with Hyper-V virtual machines.
  • Back up and restore data by using Windows Server Backup.
  • Describe high availability with failover clustering in Window Server 2016.
Module 8: Implementing failover clusteringThis module explains how to plan for failover clustering. It also explains how to create, manage, and troubleshoot a failover cluster.Lessons
  • Planning a failover cluster
  • Creating and configuring a new failover cluster
  • Maintaining a failover cluster
  • Troubleshooting a failover cluster
  • Implementing site high availability with stretch clustering
Lab : Implementing a failover clustering
  • Creating a failover cluster
  • Verifying quorum settings and adding a node
Lab : Managing a failover cluster
  • Evicting a node and verifying quorum settings
  • Changing the quorum from Disk Witness to File Share Witness, and defining node voting
  • Verifying high availability

After completing this module, students will be able to:

  • Plan for a failover-clustering implementation.
  • Create and configure a failover cluster.
  • Maintain a failover cluster.
  • Troubleshoot a failover cluster.
  • Implement high availability and stretch clustering for a site.
Module 9: Implementing failover clustering with Windows Server 2016 Hyper-VThis module describes how Hyper-V integrates with failover clustering. It also explains how to implement Hyper-V virtual machines (VMs) in failover clusters.Lessons
  • Overview of the integration of Hyper-V Server 2016 with failover clustering
  • Implementing Hyper-V VMs on failover clusters
  • Key features for VMs in a clustered environment
Lab : Implementing failover clustering with Windows Server 2016 Hyper-V
  • Configure iSCSI storage
  • Configuring a failover cluster for Hyper-V
  • Configuring a highly available VM

After completing this module, students will be able to:

  • Describe how Hyper-V integrates with failover clustering.
  • Implement Hyper-V VMs on failover clusters.
  • Describe the key features for VMs in a clustered environment.
Module 10: Implementing Network Load BalancingThis module provides an overview of NLB clusters. It also explains how to plan and configure an NLB cluster implementation.Lessons
  • Overview of NLB
  • Configuring an NLB cluster
  • Planning an NLB implementation
Lab : Implementing NLB
  • Implementing a Network Load Balancing (NLB) cluster
  • Configuring and managing the NLB cluster
  • Validating high availability for the NLB cluster

After completing this module, students will be able to:

  • Describe NLB.
  • Configure an NLB cluster.
  • Explain how to plan an NLB implementation.
Module 11: Creating and managing deployment imagesThis module provides an overview of the Windows Server 2016 image deployment process. It also explains how to create and manage deployment images by using the Microsoft Deployment Toolkit (MDT). Additionally, it describes different workloads in the virtual machine environment.Lessons
  • Introduction to deployment images
  • Creating and managing deployment images by using MDT
  • Virtual machine environments for different workloads
Lab : Using MDT to deploy Windows Server 2016
  • Configuring MDT
  • Creating and deploying an image

After completing this module, students will be able to:

  • Describe the Windows Server 2016 image deployment process.
  • Create and manage deployment images by using MDT.
  • Describe the different workloads in the virtual machine environment.
Module 12: Managing, monitoring, and maintaining virtual machine installationsThis module provides an overview on Windows Server Update Services (WSUS) and the requirements to implement WSUS. It explains how to manage the update process with WSUS. Additionally, this module provides an overview of Windows PowerShell Desired State Configuration (DSC) and Windows Server 2016 monitoring tools. Finally, this module describes how to use Performance Monitor, and how to manage event logs.Lessons
  • WSUS overview and deployment options
  • Update management process with WSUS
  • Overview of Windows PowerShell DSC
  • Overview of Windows Server 2016 monitoring tools
  • Using Performance Monitor
  • Monitoring event logs
Lab : Implementing WSUS and deploying updates
  • Implementing WSUS
  • Configuring update settings
  • Approving and deploying an update by using WSUS
Lab : Monitoring and troubleshooting Windows Server 2016
  • Establishing a performance baseline
  • Identifying the source of a performance problem
  • Viewing and configuring centralized event logs

After completing this module, students will be able to:

  • Describe the purpose of WSUS and the requirements to implement WSUS.
  • Manage the update process with WSUS.
  • Describe the purpose and benefits of Windows PowerShell DSC.
  • Describe the monitoring tools available in Windows Server 2016.
  • Use Performance Monitor.
  • Manage event logs.

 


Networking with Windows Server 2016

Course Outline?

Module 1: Planning and implementing an IPv4 networkThis module also explains how to use fundamental networking tools and techniques to configure and troubleshoot IPv4-based networks. Lessons

  • Planning IPv4 addressing
  • Configuring an IPv4 host
  • Managing and troubleshooting IPv4 network connectivity
Lab : Planning an IPv4 network
  • Planning the IPv4 address assignments
Lab : Implementing and troubleshooting an IPv4 network
  • Verifying IPv4
  • Troubleshooting IPv4

After completing this module, students will be able to:

  • Plan IPv4 addressing.
  • Configure an IPv4 host.
  • Manage and troubleshoot IPv4 network connectivity

 

Module 2: Implementing DHCPThis module explains how to plan and implement DHCP to support the IPv4 infrastructure.Lessons

  • Overview of the DHCP server role
  • Deploying DHCP
  • Managing and troubleshooting DHCP
Lab : Implementing DHCP
  • Planning a DHCP server implementation
  • Implementing the DHCP configuration
  • Validating the DHCP implementation

After completing this module, students will be able to:

  • Explain the DHCP server role.
  • Deploy DHCP.
  • Manage and troubleshoot DHCP.
Module 3: Implementing IPv6This module explains how to implement IPv6, and how to integrate IPv6 and IPv4 networks.Lessons
  • Overview of IPv6 addressing
  • Configuring an IPv6 host
  • Implementing IPv6 and IPv4 coexistence
  • Transitioning from IPv4 to IPv6
Lab : Configuring and evaluating IPv6 transition technologies
  • Reviewing the default IPv6 configuration
  • Implementing DHCPv6
  • Configuring network integration by using ISATAP
  • Configuring native IPv6 connectivity
  • Configuring 6to4 connectivity

After completing this module, students will be able to:

  • Describe the features and benefits of IPv6.
  • Configure an IPv6 host.
  • Implement the coexistence between IPv4 and IPv6 networks.
  • Transition from an IPv4 network to an IPv6 network.
Module 4: Implementing DNSThis module explains how to install, configure, and troubleshoot DNS within the organization’s network.Lessons
  • Implementing DNS servers
  • Configuring zones in DNS
  • Configuring name resolution between DNS zones
  • Configuring DNS integration with Active Directory Domain Services (AD DS)
  • Configuring advanced DNS settings
Lab : Planning and implementing name resolution by using DNS
  • Planning DNS name resolution
  • Implementing DNS servers and zones
Lab : Integrating DNS with Active Directory
  • Integrating DNS with Active Directory
Lab : Configuring advanced DNS settings
  • Configuring DNS policies
  • Validating the DNS implementation
  • Troubleshooting DNS

After completing this module, students will be able to:

  • Implement DNS servers.
  • Configure zones in DNS.
  • Configure name resolution between DNS zones.
  • Configure DNS integration with AD DS.
  • Configure advanced DNS settings

 

Module 5: Implementing and managing IPAMThis module explains how to implement and manage the IPAM feature in Windows Server 2016. This module also explains how to use IPAM to manage services such as DHCP and DNS.Lessons
  • Overview of IPAM
  • Deploying IPAM
  • Managing IP address spaces by using IPAM
Lab : Implementing IPAM
  • Installing the IPAM Server feature
  • Provisioning the IPAM Server
  • Managing IP address spaces by using IPAM

After completing this module, students will be able to:

  • Describe the IPAM functionality and components.
  • Deploy IPAM.
  • Manage IP address spaces by using IPAM.
Module 6: Remote access in Windows Server 2016This module explains how to plan for remote access in Windows Server 2016 and how to implement Web Application Proxy.Lessons
  • Overview of remote access
  • Implementing the Web Application Proxy
Lab : Implementing Web Application Proxy
  • Implementing Web Application Proxy
  • Validating the Web Application Proxy deployment

After completing this module, students will be able to:

  • Describe remote access.
  • Implement Web Application Proxy.
Module 7: Implementing DirectAccessThis module explains how to implement and manage DirectAccess in Windows Server 2016.Lessons
  • Overview of DirectAccess
  • Implementing DirectAccess by using the Getting Started Wizard
  • Implementing and managing an advanced DirectAccess infrastructure
Lab : Implementing DirectAccess by using the Getting Started Wizard
  • Verifying readiness for a DirectAccess deployment
  • Configuring DirectAccess
  • Validating the DirectAccess deployment
Lab : Deploying an advanced DirectAccess solution
  • Preparing the environment for DirectAccess
  • Implementing the advanced DirectAccess infrastructure
  • Validating the DirectAccess deployment

After completing this module, students will be able to:

  • Explain DirectAccess and how it works.
  • Implement DirectAccess by using the Getting Started Wizard.
  • Implement and manage an advanced DirectAccess infrastructure.
Module 8: Implementing VPNsThis module explains how to implement and manage remote access in Windows Server 2016 by using VPNs.Lessons
  • Planning VPNs
  • Implementing VPNs
Lab : Implementing VPN
  • Implementing VPN
  • Validating the VPN deployment
  • Troubleshooting VPN access

After completing this module, students will be able to:

  • Plan a VPN solution.
  • Implement VPNs.
Module 9: Implementing networking for branch officesThis module explains how to implement network services for branch offices.Lessons
  • Networking features and considerations for branch offices
  • Implementing Distributed File System (DFS) for branch offices
  • Implementing BranchCache for branch offices
Lab : Implementing DFS for branch offices
  • Implementing DFS
  • Validating the deployment
Lab : Implementing BranchCache
  • Implementing BranchCache
  • Validating the deployment

After completing this module, students will be able to:

  • Describe the networking features and considerations for branch offices.
  • Implement DFS for branch offices.
  • Implement BranchCache for branch offices.
Module 10: Configuring advanced networking featuresThis module explains how to implement an advanced networking infrastructure.Lessons
  • Overview of high performance networking features
  • Configuring advanced Microsoft Hyper-V networking features
Lab : Configuring advanced Hyper-V networking features
  • Creating and using Hyper-V virtual switches
  • Configuring and using the advanced features of a virtual switch

After completing this module, students will be able to:

  • Describe the high performance networking enhancements in Windows Server 2016.
  • Configure the advanced Microsoft Hyper-V networking features.
Module 11: Implementing Software Defined NetworkingThis module explains how to implement SDN.Lessons
  • Overview of SDN.
  • Implementing network virtualization
  • Implementing Network Controller
Lab : Deploying Network Controller
  • Preparing to deploy Network Controller
  • Deploying Network Controller

After completing this module, students will be able to:

  • Describe SDN.
  • Implement network virtualization.
  • Implement Network Controller.

 

 


Identity with Windows Server 2016

Course Outline
 

Module 1: Installing and configuring domain controllersThis module describes the features of AD DS and how to install domain controllers (DCs). It also covers the considerations for deploying DCs.Lessons

  • Overview of AD DS
  • Overview of AD DS domain controllers
  • Deploying a domain controller
Lab : Deploying and administering AD DS
  • Deploying AD DS
  • Deploying domain controllers by performing domain controller cloning
  • Administering AD DS

After completing this module, students will be able to:

  • Describe AD DS and its main components.
  • Describe the purpose and roles of domain controllers.
  • Describe the considerations for deploying domain controllers.
Module 2: Managing objects in AD DSThis module describes how to use various techniques to manage objects in AD DS. This includes creating and configuring user, group, and computer objects.Lessons
  • Managing user accounts
  • Managing groups in AD DS
  • Managing computer objects in AD DS
  • Using Windows PowerShell for AD DS administration
  • Implementing and managing OUs
Lab : Managing AD DS objects
  • Creating and managing groups in AD DS
  • Creating and configuring user accounts in AD DS
  • Managing computer objects in AD DS
Lab : Administering AD DS
  • Delegate administration for OUs
  • Creating and modifying AD DS objects with Windows PowerShell

After completing this module, students will be able to:

  • Manage user accounts in AD DS.
  • Manage groups in AD DS.
  • Manage computer objects in AD DS.
  • Use Windows PowerShell for AD DS administration.
  • Implement and manage OUs.
  • Administer AD DS.
Module 3: Advanced AD DS infrastructure managementThis module describes how to plan and implement an AD DS deployment that includes multiple domains and forests. The module provides an overview of the components in an advanced AD DS deployment, the process of implementing a distributed AD DS environment, and the procedure for configuring AD DS trusts.Lessons
  • Overview of advanced AD DS deployments
  • Deploying a distributed AD DS environment
  • Configuring AD DS trusts
Lab : Domain and trust management in AD DS
  • Implementing forest trusts
  • Implementing child domains in AD DS

After completing this module, students will be able to:

  • Describe the components of an advanced AD DS deployment.
  • Deploy a distributed AD DS environment..
  • Configure AD DS trusts.

.Module 4: Implementing and administering AD DS sites and replicationThis module describes how to plan and implement an AD DS deployment that includes multiple locations. The module explains how replication works in a Windows Server 2016 AD DS environment.Lessons

  • Overview of AD DS replication
  • Configuring AD DS sites
  • Configuring and monitoring AD DS replication
Lab : Implementing AD DS sites and replication
  • Modifying the default site
  • Creating additional sites and subnets
  • Configuring AD DS replication
  • Monitoring and troubleshooting AD DS replication

After completing this module, students will be able to:

  • Describe how AD DS replication works.
  • Configure AD DS sites to help optimize authentication and replication traffic.
  • Configure and monitor AD DS replication.

Module 5: Implementing Group PolicyThis module describes how to implement a GPO infrastructure. The module provides an overview of the components and technologies that compose the Group Policy framework.Lessons

  • Introducing Group Policy
  • Implementing and administering GPOs
  • Group Policy scope and Group Policy processing
  • Troubleshooting the application of GPOs
Lab : Implementing a Group Policy infrastructure
  • Creating and configuring GPOs
  • Managing GPO scope
Lab : Troubleshooting Group Policy infrastructure
  • Verify GPO application
  • Troubleshooting GPOs

After completing this module, students will be able to:

  • Explain what Group Policy is.
  • Implement and administer GPOs.
  • Describe Group Policy scope and Group Policy processing.
  • Troubleshoot GPO application.

Module 6: Managing user settings with Group PolicyThis module describes how to configure Group Policy settings and Group Policy preferences. This includes implementing administrative templates, configuring folder redirection and scripts, and configuring Group Policy preferences.Lessons

  • Implementing administrative templates
  • Configuring Folder Redirection, software installation, and scripts
  • Configuring Group Policy preferences
Lab : Managing user settings with GPOs
  • Using administrative templates to manage user settings
  • Implement settings by using Group Policy preferences
  • Configuring Folder Redirection
  • Planning Group Policy (optional)

After completing this module, students will be able to:

  • Implement administrative templates.
  • Configure Folder Redirection, software installation, and scripts.
  • Configure Group Policy preferences.

Module 7: Securing Active Directory Domain ServicesThis module describes how to configure domain controller security, account security, password security, and Group Managed Service Accounts (gMSA).Lessons

  • Securing domain controllers
  • Implementing account security
  • Implementing audit authentication
  • Configuring managed service accounts
Lab : Securing AD DS
  • Implementing security policies for accounts, passwords, and administrative groups
  • Deploying and configuring an RODC
  • Creating and associating a group MSA

After completing this module, students will be able to:

  • Secure domain controllers.
  • Implement account security.
  • Implement audit authentication.
  • Configure managed service accounts (MSAs).

Module 8: Deploying and managing AD CSThis module describes how to implement an AD CS deployment. This includes deploying, administering, and troubleshooting CAs.Lessons

  • Deploying CAs
  • Administering CAs
  • Troubleshooting and maintaining CAs
Lab : Deploying and configuring a two-tier CA hierarchy
  • Deploying an offline root CA
  • Deploying an enterprise subordinate CA

After completing this module, students will be able to:

  • Deploy CAs.
  • Administer CAs.
  • Troubleshoot and maintain CAs.

Module 9: Deploying and managing certificatesThis module describes how to deploy and manage certificates in an AD DS environment. This involves deploying and managing certificate templates, managing certificate revocation and recovery, using certificates in a business environment, and implementing smart cards.Lessons

  • Deploying and managing certificate templates
  • Managing certificate deployment, revocation, and recovery
  • Using certificates in a business environment
  • Implementing and managing smart cards
Lab : Deploying and using certificates
  • Configuring certificate templates
  • Enrolling and using certificates
  • Configuring and implementing key recovery

After completing this module, students will be able to:

  • Deploy and manage certificate templates.
  • Manage certificates deployment, revocation, and recovery.
  • Use certificates in a business environment.
  • Implement and manage smart cards

Module 10: Implementing and administering AD FSThis module describes AD FS and how to configure AD FS in a single-organization scenario and in a partner-organization scenario.Lessons

  • Overview of AD FS
  • AD FS requirements and planning
  • Deploying and configuring AD FS
  • Overview of Web Application Proxy
Lab : Implementing AD FS
  • Configuring AD FS prerequisites
  • Installing and configuring AD FS
  • Configuring an internal application for AD
  • Configuring AD FS for federated business partners

After completing this module, students will be able to:

  • Describe AD FS.
  • Explain how to deploy AD FS.
  • Explain how to implement AD FS for a single organization.
  • Explain how to extend AD FS to external clients.
  • Implement single sign-on (SSO) to support online services.

Module 11: Implementing and administering AD RMSThis module describes how to implement an AD RMS deployment. The module provides an overview of AD RMS, explains how to deploy and manage an AD RMS infrastructure, and explains how to configure AD RMS content protection.Lessons

  • Overview of AD RMS
  • Deploying and managing an AD RMS infrastructure
  • Configuring AD RMS content protection
Lab : Implementing an AD RMS infrastructure
  • Installing and configuring AD RMS
  • Configuring AD RMS templates
  • Using AD RMS on clients

After completing this module, students will be able to:

  • Describe AD RMS.
  • Deploy and manage an AD RMS infrastructure. .
  • Configure AD RMS content protection.

Module 12: Implementing AD DS synchronization with Microsoft Azure ADThis module describes how to plan and configure directory syncing between Microsoft Azure Active Directory (Azure AD) and on-premises AD DS. The modules describes various sync scenarios, such as Azure AD sync, AD FS and Azure AD, and Azure AD Connect.Lessons

  • Planning and preparing for directory synchronization
  • Implementing directory synchronization by using Azure AD Connect
  • Managing identities with directory synchronization
Lab : Configuring directory synchronization
  • Preparing for directory synchronization
  • Configuring directory synchronization
  • Managing Active Directory users and groups

After completing this module, students will be able to:

  • Plan and prepare for directory synchronization.
  • Implement directory synchronization by using Microsoft Azure Active Directory Connect (Azure AD Connect).
  • Manage identities with directory synchronization.

Module 13: Monitoring, managing, and recovering AD DSThis module describes how to monitor, manage, and maintain AD DS to help achieve high availability of AD DS.Lessons

  • Monitoring AD DS
  • Managing the Active Directory database
  • Active Directory backup and recovery options for AD DS and other identity and access solutions
Lab : Recovering objects in AD DS
  • Backing up and restoring AD DS
  • Recovering objects in AD DS

 

After completing this module, students will be able to:

  • Monitor AD DS.
  • Manage the Active Directory database.
  • Describe the backup and recovery options for AD DS and other identity access solutions.

 


Designing and Implementing a Server Infrastructure

Course Outline
 

Module 1: Implementing Advanced Network Services

In this module students will be able to configure advanced features for Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS), and configure IP Address Management (IPAM).

 

Lessons

  • Configuring Advanced DHCP Features
  • Configuring Advanced DNS Settings
  • Implementing IPAM
  • Managing IP Address Spaces with IPAM

Lab : Implementing Advanced Network Services

  • Configuring Advanced DHCP Settings
  • Configuring Advanced DNS Settings
  • Configuring IPAM 

After completing this module, students will be able to:

  • Configure advanced features in DHCP with Windows Server 2012.
  • Configure the advanced DNS settings in Windows Server 2012.
  • Implement IP Address Management in Windows Server 2012.

 

Module 2: Implementing Advanced File ServicesIn this module students will be able to configure file services to meet advanced business requirements.Lessons

  • Configuring iSCSI Storage
  • Configuring BranchCache
  • Optimizing Storage Usage

Lab : Implementing Advanced File Services

  • Configuring iSCSI Storage
  • Configuring the File Classification Infrastructure

Lab : Implementing BranchCache

  • Configuring the Main Office Servers for BranchCache
  • Configuring the Branch Office Servers for BranchCache
  • Configuring Client Computers for BranchCache
  • Monitoring BranchCache

After completing this module, students will be able to:

  • Learn how to configure and manage iSCSI.
  • Implement BranchCache using Windows Server 2012.
  • Implement Windows Server 2012 features that optimize storage utilization.

 

Module 3: Implementing Dynamic Access ControlIn this module students will be able to configure Dynamic Access Control (DAC) to manage and audit access to shared files.Lessons

  • Overview of DAC
  • Implementing DAC Components
  • Implementing DAC for Access Control
  • Implementing Access Denied Assistance
  • Implementing and Managing Work Folders

Lab : Implementing Secure Data Access

  • Preparing for DAC deployment
  • Implementing DAC
  • Validating and Remediating DAC
  • Implementing Work Folders

After completing this module, students will be able to:

  • Describe DAC.
  • Implement and configure components of DAC.
  • Implement DAC on file servers.
  • Describe and implement access- denied assistance.
  • Implement the integration of Work Folders with DAC.

 

Module 4: Implementing Distributed AD DS DeploymentsIn this module students will be able to plan and implement an Active Directory Domain Services (AD DS) deployment that includes multiple domains and forests.Lessons

  • Overview of Distributed AD DS Deployments
  • Deploying a Distributed AD DS Environment
  • Configuring AD DS Trusts

Lab : Implementing Distributed AD DS Deployments

  • Implementing Child Domains in AD DS
  • Implementing Forest Trusts

After completing this module, students will be able to:

  • Describe the components of a highly complex AD DS deployment.
  • Implement a complex AD DS deployment.
  • Configure AD DS trusts.

 

Module 5: Implementing AD DS Sites and Replication

In this module students will be able to plan and implement an AD DS deployment that includes multiple locations.

Lessons

  • AD DS Replication Overview
  • Configuring AD DS Sites
  • Configuring and Monitoring AD DS Replication

Lab : Implementing AD DS Sites and Replication

  • Modifying the Default Site
  • Creating Additional Sites and Subnets
  • Configuring AD DS Replication
  • Monitoring and Troubleshooting AD DS Replication

After completing this module, students will be able to:

  • Describe how replication works in a Windows Server 2012 AD DS environment.
  • Configure AD DS sites in order to optimize AD DS network traffic.
  • Configure and monitor AD DS replication.

 

Module 6: Implementing Active Directory Certificate ServicesIn this module students will be able to implement an Active Directory Certificate Services (AD CS) deployment.Lessons

  • Using Certificates in a Business Environment
  • PKI Overview
  • Deploying CAs
  • Deploying and Managing Certificate Templates
  • Implementing Certificate Distribution and Revocation
  • Managing Certificate Recovery

Lab : Deploying and Configuring CA Hierarchy

  • Deploying a Stand-alone Root CA
  • Deploying an Enterprise Subordinate CA

Lab : Deploying and Managing Certificates

  • Configuring Certificate Templates
  • Configuring Certificate Enrollment
  • Configuring Certificate Revocation
  • Configuring Key Recovery

After completing this module, students will be able to:

  • Describe and use certificates in business environments.
  • Describe the Public Key Infrastructure (PKI) components and concepts, and describe the options for implementing a certification authority infrastructure.
  • Plan and implement an AD CS certification authority infrastructure.
  • Plan and implement a certificate template deployment using an AD CS certification authority.
  • Plan and implement certificate distribution and revocation.
  • Configure and manage key archival and recovery.

 

Module 7: Implementing Active Directory Rights Management ServicesIn this module students will be able to implement an AD RMS deployment.Lessons

  • AD RMS Overview
  • Deploying and Managing an AD RMS Infrastructure
  • Configuring AD RMS Content Protection
  • Configuring External Access to AD RMS

Lab : Implementing AD RMS

  • Installing and Configuring AD RMS
  • Configuring AD RMS Templates
  • Implementing the AD RMS Trust Policies
  • Verifying the AD RMS Deployment

After completing this module, students will be able to:

  • Describe what AD RMS is, and how it can be used to achieve content protection.
  • Deploy and manage an AD RMS infrastructure.
  • Configure content protection using AD RMS.
  • Enable users outside the organization to access content protected by using AD RMS.

 

Module 8: Implementing Active Directory Federation ServicesIn this module students will be able to implement an Active Directory Federation Services (AD FS) deployment.Lessons

  • Overview of AD FS
  • Deploying AD FS
  • Implementing AD FS for a Single Organization
  • Deploying AD FS in a Business-to-Business Federation Scenario
  • Extending AD FS to External Clients

Lab : Implementing AD FS

  • Installing and Configuring AD FS
  • Configuring an Internal Application for AD FS

Lab : Implementing AD FS for External Partners and Users

  • Configuring AD FS for a Federated Business Partner
  • Configuring Web Application Proxy

After completing this module, students will be able to:

  • Describe the identity federation business scenarios and how AD FS can be used to address the scenarios.
  • Configure the AD FS prerequisites and deploy the AD FS services.
  • Implement AD FS to enable SSO in a single organization.
  • Implement AD FS to enable SSO between federated partners.
  • Implement the Web Application Proxy and describe WorkPlace Join integration with AD FS.

Module 9: Implementing Network Load Balancing

In this module students will be able to provide high availability and load balancing for web-based applications by implementing Network Load Balancing (NLB).

Lessons

  • Overview of NLB
  • Configuring an NLB Cluster
  • Planning an NLB Implementation

Lab : Implementing NLB

  • Implementing an NLB Cluster
  • Configuring and Managing the NLB Cluster
  • Validating High Availability for the NLB Cluster

After completing this module, students will be able to:

  • Describe how NLB works.
  • Configure an NLB cluster.
  • Plan an NLB implementation.

 

Module 10: Implementing Failover Clustering

In this module students will be able to provide high availability for network services and applications by implementing failover clustering.

Lessons

  • Failover Clustering Overview
  • Implementing a Failover Cluster
  • Configuring Highly Available Applications and Services on a Failover Cluster
  • Maintaining a Failover Cluster
  • Implementing a Multi-Site Failover Cluster

Lab : Implementing Failover Clustering

  • Configuring a Failover Cluster
  • Deploying and Configuring a Highly Available File Server
  • Validating the Deployment of the Highly Available File Server
  • Configuring Cluster-Aware Updating on the Failover Cluster

After completing this module, students will be able to:

  • Explain failover clustering features in Windows Server 2012.
  • Describe how to implement a failover cluster.
  • Explain how to configure highly available applications and services on a failover cluster.
  • Explain how to maintain a failover cluster and how to use new maintenance features.
  • Describe how to implement multi-site failover cluster.

 

Module 11: Implementing Failover Clustering with Hyper-V

In this module students will be able to deploy and manage Hyper-V virtual machines in a failover cluster.

Lessons

  • Overview of Integrating Hyper-V with Failover Clustering
  • Implementing Hyper-V Virtual Machines on Failover Clusters
  • Implementing Hyper-V Virtual Machine Movement
  • Managing Hyper-V Virtual Environments by Using VMM

Lab : Implementing Failover Clustering with Hyper-V

  • Configuring Hyper-V Replicas
  • Configuring a Failover Cluster for Hyper-V
  • Configuring a Highly Available Virtual Machine

After completing this module, students will be able to:

  • Explain options for making virtual machines highly available.
  • Describe how to implement virtual machines in a failover cluster deployed on a host.
  • Explain options for moving a virtual machine or its storage.
  • Explain a high level overview of Microsoft System Center 2012- Virtual Machine Manager (VMM) 2012.

 

Module 12: Implementing Business Continuity and Disaster Recovery

In this module students will be able to implement a backup and disaster recovery solution based on business and technical requirements.

Lessons

  • Data Protection Overview
  • Implementing Windows Server Backup
  • Implementing Server and Data Recovery

Lab : Implementing Windows Server Backup and Restore

  • Backing Up Data on a Windows Server 2012 R2 Server
  • Restoring Files Using Windows Server Backup

After completing this module, students will be able to:

  • Describe the considerations that must be included when you are implementing a disaster recovery solution.
  • Plan and implement a backup solution for Windows Server 2012.
  • Plan and implement server and data recovery.

 


Implementing an Advanced Server Infrastructure

Course Outline

 

Module 1: Overview of Management in an Enterprise Data Center

This module describes some of the changes and new requirements that organizations are experiencing in their data centers. The module then describes how you can use System Center 2012 to manage this environment.

 

Lessons

  • Overview of the Enterprise Data Center
  • Overview of the Microsoft System Center 2012 Components
  • Considerations for Implementing an Enterprise Data Center

Lab : Considerations for Implementing an Enterprise Data Center

  • Planning the Secure Implementation of Services Within an Enterprise Data Center

After completing this module, students will be able to:

  • Describe the enterprise data center.
  • Describe how you can use System Center 2012 to manage the enterprise data center.

 

Module 2: Planning and Implementing a Server Virtualization Strategy

This module introduces the Microsoft System Center 2012 components. You will see how they can integrate to enable you to configure, deploy, and manage a server virtualization environment. Later, you will review the planning steps and considerations for a Microsoft System Center 2012 - Virtual Machine Manager (VMM) deployment.

 

Lessons

  • Planning a VMM Deployment
  • Planning and Implementing a Server Virtualization Host Environment
  • Planning and Implementing a Network Infrastructure for Virtualization

Lab : Planning and Implementing a Server Virtualization Strategy

  • Planning the Hyper-V Host Deployment
  • Configuring Hyper-V Host Groups
  • Configuring VMM Libraries

After completing this module, students will be able to:

  • Describe how you can use System Center 2012 to deploy and manage a virtualization environment.
  • Plan and implement a sever virtualization strategy by using Windows Server 2012 Hyper-V and VMM.
  • Deploy Hyper-V hosts, configure host groups, and implement VMM libraries.

 

Module 3: Planning and Implementing Networks and Storage for Virtualization

This module describes the factors that you must consider when you are planning the storage and network infrastructure for your virtual environment, and details on how to deploy these components in Windows Server 2012 Hyper-V and VMM.

 

Lessons

  • Planning a Storage Infrastructure for Virtualization
  • Implementing a Storage Infrastructure for Virtualization
  • Planning and Implementing a Network Infrastructure for Virtualization

Lab : Planning and Implementing Virtualization Networks and Storage

  • Planning a Storage Infrastructure for Virtualization
  • Planning a Network Infrastructure for Virtualization
  • Implementing a Storage Infrastructure for Virtualization
  • Implementing a Network Infrastructure for Virtualization

After completing this module, students will be able to:

  • Plan a storage infrastructure for server virtualization.
  • Implement a storage infrastructure for server virtualization.
  • Plan and implement a network infrastructure for server virtualization.

 

Module 4: Planning and Deploying Virtual Machines

In this module, you will learn how to configure virtual machines, reusable profiles, and templates to aid in deployment. You also will review application specific workloads, and learn about the options for physical and virtual machine migrations.

 

Lessons

  • Planning Virtual Machine Configuration
  • Preparing for Virtual Machine Deployments with VMM
  • Deploying Virtual Machines

Lab : Planning and Implementing a Virtual Machine Deployment and Management Strategy

  • Planning Physical-to-Virtual Server Conversions
  • Planning Virtual Machine and Service Templates
  • Configuring VMM Profiles and Templates
  • Deploying Virtual Machines by Using VMM Templates

After completing this module, students will be able to:

  • Plan virtual machine configurations.
  • Plan and configure the VMM profiles and templates that you can use to implement a VMM deployment.
  • Plan and implement a virtual machine deployment in VMM.

 

Module 5: Planning and Implementing a Virtualization Administration Solution

This module will prepare you for designing an administrative model that you can use to manage virtualization using System Center 2012. You will see and use VMM, Microsoft System Center 2012 – Orchestrator (Orchestrator) and Microsoft System Center 2012 – App Controller (App Controller). Use these components to delegate administrative functions, plan for basic self-service, design and implement automation. The skills gained in this module are the foundation for the basic building blocks used to operate an IT infrastructure that is similar or equal to that of cloud computing.

 

Lessons

  • Planning and Implementing Automation with System Center 2012
  • Planning and Implementing System Center 2012 Administration
  • Planning and Implementing Self-Service Options in System Center 2012

Lab : Planning and Implementing an Administration Solution for Virtualization

  • Configuring Process Automation in System Center
  • Planning Administrative Delegation and Self-Service in System Center 2012
  • Configuring Delegated Administration and Self-Service in VMM

After completing this module, students will be able to:

  • Plan automation of a virtual machine environment by using Orchestrator and System Center 2012 integration.
  • Plan a delegated administration model using VMM.
  • Plan self-service in a virtual machine environment by using VMM and App Controller.

 

Module 6: Planning and Implementing a Server Monitoring StrategyThis module explains how to use the monitoring tools included in Windows Server 2012 and Microsoft System Center 2012 – Operations Manager (Operations Manager).Lessons

  • Planning Monitoring in Windows Server 2012
  • Overview of System Center Operations Manager
  • Planning and Configuring Management Packs
  • Planning and Configuration Notifications and Reporting
  • Configuring Integration with VMM

Lab : Implementing a Server Monitoring Strategy

  • Configuring Server Monitoring Using Windows Server 2012
  • Implementing the Microsoft System Center 2012 - Operations Manager Agent
  • Configuring Operations Manager Monitoring Components

After completing this module, students will be able to:

  • Plan monitoring in Windows Server 2012.
  • Describe Operations Manager.
  • Plan the configuration of management packs.
  • Plan the configuration of notifications and reporting.
  • Configure integration of Operations Manager and VMM.

 

Module 7: Planning and Implementing High Availability for File Services and Applications

This module explains how to plan and implement high availability for file services and applications.

Lessons

  • Planning and Implementing Storage Spaces
  • Planning and Implementing Distributed File System (DFS)
  • Planning and Implementing Network Load Balancing (NLB)

Lab : Planning and Implementing High Availability for File Services and Applications

  • Planning a High Availability Strategy for File Services
  • Planning a High Availability Strategy for Web Applications
  • Implementing a High Availability Solution for File Storage
  • Implementing a High Availability Solution by Using NLB

After completing this module, students will be able to:

  • Explain how to plan and implement Storage Spaces.
  • Explain how to plan and implement DFS.
  • Explain how to plan and implement NLB.
  • Explain how to plan and implement high availability for file services and applications.

 

Module 8: Planning and Implementing a High Availability Infrastructure Using Failover ClusteringThis module explains how to plan and implement failover clustering.Lessons

  • Planning an Infrastructure for Failover Clustering
  • Implementing Failover Clustering
  • Integrating Failover Clustering with Server Virtualization
  • Planning a Multisite Failover Cluster

Lab : Planning and Implementing a High Availability Infrastructure by Using Failover Clustering

  • Designing High Availability Server Roles
  • Implement Hyper-V Replica
  • Deploy a Failover Cluster
  • Implement a Scale-Out File Server
  • Implement High Availability Virtual Machines
  • Implement Operations Manager and VMM Integration

After completing this module, students will be able to:

  • Plan an infrastructure for failover clustering.
  • Implement failover clustering.
  • Integrate failover clustering with server virtualization.
  • Plan a multisite failover clustering.

 

Module 9: Planning and Implementing Server Update InfrastructureThis module explains how to plan and implement server update infrastructure by using Windows Server Update Service (WSUS), Configuration Manager, and VMM.Lessons

  • Planning and Implementing a WSUS Deployment
  • Planning Software Updates with System Center 2012 Configuration Manager
  • Planning and Implementing Updates in a Server Virtualization Infrastructure
  • Planning and Implementing Virtual Machine Backup and Recovery

Lab : Planning and Implementing an Update Remediation Infrastructure

  • Implement Host Updating in VMM
  • Configuring Failover Clustering and Cluster Aware Updating (CAU)
  • Planning a WSUS Deployment
  • Deploying a Replica WSUS Server
  • Configure Client Update Options

After completing this module, students will be able to:

  • Plan and implement a WSUS Deployment.
  • Plan software updates with Configuration Manager.
  • Plan and implement updates in a server virtualization infrastructure.

 

Module 10: Planning and Implementing a Business Continuity StrategyThis module explains how to plan and implement a business-continuity strategy for your organization, and how to plan and implement backup and recovery strategies, including virtual-machine backup and recovery.Lessons

  • Overview of Business Continuity Planning
  • Planning and Implementing Backup Strategies
  • Planning and Implementing Recovery
  • Planning and Implementing Backup and Recovery of Virtual Machines

Lab : Implementing a Virtual Machine Backup Strategy with DPM

  • Configure DPM
  • Backup and restore virtual machine data
  • Backup and restore virtual machines

After completing this module, students will be able to:

  • Understand the importance of business continuity planning.
  • Plan and implement backup strategies.
  • Plan and implement recovery.
  • Plan and implement virtual machine backup and recovery.

Module 11: Planning and Implementing an Public Key InfrastructureThis module explains how to plan and implement the various aspects of a PKI, and build an internal PKI by using AD CS.Lessons

  • Planning and Implementing Deployment of a Certification Authority
  • Planning and Implementing Certificate Templates
  • Planning and Implementing Certificate Distribution and Revocation
  • Planning and Implementing Key Archival and Recovery

Lab : Planning and Implementing an AD CS Infrastructure

  • Planning the AD CS Deployment
  • Deploying the CA Infrastructure
  • Implementing Certificate Templates
  • Implementing Certificate Revocation and Distribution

After completing this module, students will be able to:

  • Plan and implement CA deployment.
  • Plan and implement certificate templates.
  • Plan and implement certificate distribution and revocation.
  • Plan and implement key archival and recovery.

 

Module 12: Planning and Implementing an Identity Federation Infrastructure

This module describes how to plan and implement an identity federation infrastructure.

Lessons

  • Planning and Implementing an Active Directory Federation Services (AD FS) Server Infrastructure
  • Planning and Implementing AD FS Claims Providers and Relying Parties
  • Planning and Implementing AD FS Claims and Claim Rules

Lab : Planning and Implementing AD FS Infrastructure

  • Designing the AD FS Deployment
  • Configuring Prerequisite Components for AD FS
  • Deploying AD FS for Internal Users
  • Deploying AD FS for a Partner Organization

After completing this module, students will be able to:

  • Plan and implement an identity federation infrastructure, including claims-aware application access.
  • Plan and implement an AD FS server infrastructure.
  • Plan and configure AD FS claim providers and relying parties.
  • Design and deploy AD FS claims and claim rules.

 

Module 13: Planning and Implementing an Information Rights Management Infrastructure

This module explains how to plan and implement an Active Directory Rights Management Services (AD RMS) deployment to protect content.

Lessons

  • Planning and Implementing an AD RMS Cluster
  • Planning and Implementing AD RMS Templates and Policies
  • Planning and Implementing External Access to AD RMS Services
  • Planning and Implementing AD RMS Integration with Dynamic Access Control (DAC)

Lab : Planning and Implementing an AD RMS Infrastructure

  • Planning the AD RMS Deployment
  • Deploying the AD RMS Infrastructure for Internal Users
  • Implementing AD RMS Integration with DAC
  • Implementing AD RMS Integration with External Users

After completing this module, students will be able to:

  • Plan and implement an AD RMS deployment.
  • Plan and manage AD RMS templates and access.
  • Plan and implement external access to AD RMS services.
  • Plan and implement AD RMS integration with DAC.

 


HP-UX

HP ATP HP-UX System Administrator

Course outline:

Navigating the System Management Homepage (SMH)

  • SAM and SMH overview
  • Launching the SMH GUI and TUI
  • Verifying SMH certificates
  • Logging into the SMH
  • Navigating the SMH interface
  • Launching SMH tools
  • Launching SMH tasks
  • Viewing SMH logs
  • Managing SMH access control
  • Managing SMH authentication
  • SMH and SIM integration concepts

Managing Users and Groups

  • User and group concepts
  • /etc/passwd, /etc/shadow, and /etc/group concepts
  • Creating, modifying, deactivating, and removing user accounts
  • Configuring password aging and password security policies
  • Managing groups
  • Managing /etc/skel

Navigating the HP-UX File System

  • Static and dynamic files and directory concepts
  • OS and application directory concepts
  • Top level directory concepts and contents
  • Searching for files and executables using the find, whereis, which, and file commands

Configuring Hardware

  • Hardware component overview
  • CPU, cell, crossbar, and Blade overview
  • SBA, LBA, and I/O overview
  • iLO/MP, core I/O, and interface adapter card overview
  • Internal disks, tapes, and DVD overview
  • Disk array, LUN, SAN, and multipathing overview
  • Partitioning overview
  • nPar, vPar, VM, and secure resource partition overview
  • System type overview
  • Entry-class rackmount server overview
  • Mid-range rackmount server overview
  • High-end server overview
  • HP BladeSystem overview
  • HP BladeSystem c-class enclosure overview
  • HP Integrity blade server overview
  • HP Integrity Superdome 2 overview
  • Viewing system hardware configuration
  • Viewing nPar, vPar, and VM hardware
  • Hardware address concepts
  • Legacy HBA, SCSI, and FC hardware address concepts
  • Agile View HBA, SCSI, and FC hardware address concepts
  • Viewing legacy hardware addresses
  • Viewing LUNs via Agile View
  • Viewing a LUN's lunpaths via Agile View
  • Viewing an HBA's lunpaths via Agile View
  • Viewing LUN health via Agile View
  • Viewing LUN attributes via Agile View
  • Enabling and disabling lunpaths
  • Slot address concepts
  • Slot address components
  • Viewing slot addresses
  • Installing interface cards with and without OL*
  • Installing new devices

Configuring Device Special Files

  • DSF attribute concepts
  • DSF directories
  • Legacy DSF names
  • Persistent DSF names
  • LUN, disk, and DVD DSF names
  • Boot disk DSFs
  • Tape drive DSFs
  • Tape autochanger DSFs
  • Terminal, modem, and printer DSFs
  • Listing legacy DSFs
  • Listing persistent DSFs
  • Correlating persistent and legacy DSFs
  • Correlating persistent DSFs with lunpaths and WWIDs
  • Decoding legacy and persistent DSF attributes
  • Creating DSFs via insf, mksf, and mknod
  • Removing DSFs via rmsf
  • Disabling and enabling legacy mode DSFs

Managing Disk Devices

  • Disk partitioning concepts
  • Whole disk partitioning concepts
  • LVM disk partitioning concepts
  • LVM physical volume concepts
  • LVM volume group concepts
  • LVM logical volume concepts
  • LVM extent concepts
  • LVM extent size concepts
  • LVM versions and limits
  • LVM DSF directories
  • LVMv1 device files
  • LVMv2 device files
  • Creating physical volumes
  • Creating LVMv1 volume groups
  • Creating LVMv2 volume groups
  • Creating logical volumes
  • Verifying the LVM configuration
  • Comparing disk space management tools

Managing File Systems

  • File system concepts
  • File system types
  • Superblock, inode, directory, block, extent, and intent log concepts
  • Hard and symbolic link concepts
  • HFS and VxFS comparison
  • Creating file systems
  • Mounting file systems
  • Unmounting file systems
  • Automatically mounting file systems
  • Mounting CDFS file systems
  • Mounting LOFS file systems
  • Mounting ISO file systems
  • Mounting MemFS file systems

Managing Swap Space

  • HP-UX memory concepts
  • HP-UX swap concepts
  • HP-UX swap types
  • HP-UX pseudoswap
  • Enabling swap via the CLI
  • Enabling swap via /etc/fstab
  • Monitoring swap space
  • Disabling swap
  • Guidelines for configuring swap space

Maintaining Logical Volumes and File Systems

  • Defragmenting file systems
  • Repairing corrupted file systems
  • Monitoring free space
  • Reclaiming wasted file system space
  • Extending, reducing, and removing volume groups
  • Extending, reducing, and removing logical volumes
  • Extending and reducing file systems

Preparing for Disasters

  • Disaster recovery, mirroring, and DRD concepts
  • Using DRD to minimize planned downtime
  • Using DRD to minimize unplanned downtime
  • Installing DRD
  • Using the drd command
  • Creating a DRD clone
  • Synchronizing a DRD clone
  • Verifying a DRD clone’s status
  • Accessing inactive images via DRD-safe commands
  • Managing software via DRD-safe commands
  • Managing kernel tunables via DRD-safe commands
  • Accessing inactive images via other commands
  • Activating and deactivating an inactive image
  • Customizing the make_*_recovery archive contents
  • Backing up the boot disk via make_tape_recovery
  • Backing up the boot disk via make_net_recovery
  • Using a make_*_recovery archive
  • Interacting with the recovery process

Accessing the System Console and the iLO/MP

  • Management processor concepts
  • Viewing MP/console ports
  • Connecting MP serial and LAN ports
  • Accessing the MP
  • Navigating the MP menu and web interfaces
  • Accessing nPar, vPar, and VM consoles
  • Accessing the VFP, console log, and system event log
  • Accessing the MP help menus
  • Accessing the MP command menu
  • Configuring the MP LAN interface
  • Enabling MP remote access
  • Managing MP user accounts and access levels
  • Managing MP login sessions
  • Rebooting via the MP

Booting PA-RISC Systems

  • HP-UX shutdown and reboot concepts
  • PA-RISC boot process major players
  • PA-RISC boot disk structures
  • PA-RISC boot process overview
  • Autoboot and manual boot concepts
  • Interacting with the BCH and ISL/IPL

Booting Integrity Systems

  • HP-UX shutdown and reboot concepts
  • Integrity boot process major players
  • Integrity boot disk structures
  • Integrity boot disk system, OS, and HPSP structures
  • Integrity and PA-RISC boot process comparison
  • UEFI/EFI addressing concepts
  • Autoboot and manual boot concepts
  • Booting from primary, alternate, and arbitrary boot devices
  • Booting from Ignite-UX servers and recovery archives
  • Managing boot menu settings
  • Managing console settings
  • Interacting with the UEFI/EFI shell
  • Interacting with the hpux.efi OS loader

Configuring the HP-UX Kernel

  • Kernel configuration concepts
  • Special kernel configurations
  • Kernel configuration commands
  • Modifying the current kernel configuration
  • Creating a named configuration
  • Copying a configuration
  • Loading a configuration
  • Kernel module concepts, states, and state changes
  • Viewing and managing module states
  • Kernel tunable concepts and types
  • Viewing, managing, and monitoring kernel tunables
  • Viewing, managing, and monitoring kernel resource alarms
  • Kernel troubleshooting
  • Viewing the kernel change log
  • Booting from an alternate kernel
  • Booting via override parameters
  • Booting to tunable maintenance mode

Managing Software with SD-UX

  • SD-UX software structure concepts
  • SD-UX software depot concepts
  • SD-UX IPD concepts
  • SD-UX daemon and agent concepts
  • Listing software
  • Installing and updating software
  • Removing software

Managing Patches with SD-UX

  • Patch concepts
  • Patch naming convention concepts
  • Patch supersession concepts
  • Patch rating concepts
  • Patch source concepts
  • Patch tool concepts
  • Downloading and installing patches from the HPSC
  • Installing patches from DVD, tape, and directory depots
  • Listing patches
  • Removing patches

Installing the OS with Ignite-UX

  • Install source concepts
  • Planning an install
  • Choosing an operating environment
  • Choosing an install-time security bundle
  • Locating the source media
  • Initiating a PA-RISC install
  • Initiating an Integrity install
  • Navigating the Ignite-UX menus
  • Verifying an installation
  • Completing post-install configuration tasks

 

 

 


1-on-1 Training

CCNA (Routing & Switching)

Crash Course / Exam Preparation Course / 1-on-1 Course

AT Computer Solution Limited is offered Crash Course / Exam Preparation Course. It will focus on the best paths to take education to help you advance in your career. It will help you to get a professional certificate easily.

 

Advantages of 1-on-1 Training are:

  • You can start from Any Date.
  • Fully customized course to suit your training need.
  • You get a personal trainer for the entire duration of the boot camp.
  • Better quality. Quality of instruction has an inverse relation with the number of students in a class.
  • Quicker learning since you receive undivided attention of the trainer. You don't have to wait for your turn to seek an explanation

 

1 to 1 CCNA (Routing & Switching) Course Outline / Crash Course

Per class 2 (two) hours

Project: 18 Hours (Real Life - Hands on Lab)

 

 

 

 

 Class 1 & 2

 1: Internetworking + Ethernet Networking and Data Encapsulation

 

 

 

 

 Class 3

 2: Introduction to TCP/IP

 

 

 

 

 Class 4 & 5

 3: Easy Subnetting + Variable Length Subnet Masks (VLSMs)

 

 

 

 

 Class 6

 4: Cisco's Internetworking Operating System (IOS)

 

 

 

 

 Class 7 & 8

 5: IP Routing with Static & RIP

 

 

 

 

 Class 9

 6: Enhanced IGRP (EIGRP)

 

 

 

 

 Class 10

 7: Open Shortest Path First (OSPF)

 

 

 

 

 Class 11 & 12

 8:Layer 2 Switching and Spanning Tree Protocol (STP) & Virtual LANs (VLANs)

 

 

 

 

 Class 13

 9: InterVLAN Routing

 

 

 

 

 Class 14

 10: Security - ACL

 

 

 

 

 Class 15

 11: Network Address Translation (NAT)

 

 

 

 

 Class 16

 12. Internet Protocol Version 6 (IPv6) with LAB

 

 

 

 

Class 17

  Detail discussion on Project:

# # Project:  18 Hours (Real Life - Hands on Lab) with Exam Preparation

Course Fee: 15,000/- Taka

*** We assure your 100% learning guaranty and CCNA pass guaranty otherwise we will refund your course fee and exam fee.

 


CCNA Security

Crash Course / Exam Preparation Course / 1-on-1 Course

AT Computer Solution Limited is offered Crash Course / Exam Preparation Course. It will focus on the best paths to take education to help you advance in your career. It will help you to get a professional certificate easily.

 

Advantages of 1-on-1 Training are:

  • You can start from Any Date.
  • Fully customized course to suit your training need.
  • You get a personal trainer for the entire duration of the boot camp.
  • Better quality. Quality of instruction has an inverse relation with the number of students in a class.
  • Quicker learning since you receive undivided attention of the trainer. You don't have to wait for your turn to seek an explanation

 

 

CCNA Security (New Version) & 210-260 IINS Exam

Course Outline

1. Security Concepts

  • Threatscape
  • Threat defense technologies
  • Security policy and basic security architectures
  • Cryptographic technologies

2. Secure Network Devices

  • Implementing AAA
  • Management protocols and systems
  • Securing the control plane

3. Layer 2 Security

  • Securing Layer 2 infrastructures
  • Securing Layer 2 protocols

4. Firewall

  • Firewall technologies
  • Introducing the Cisco ASA v9.2
  • Cisco ASA access control and service policies
  • Cisco IOS zone based firewall

5. VPN

  • IPsec technologies
  • Site-to-site VPN
  • Client-based remote access VPN
  • Clientless remote access VPN

6. Advanced Topics

  • Intrusion detection and protection
  • Endpoint protection
  • Content security
  • Advanced network security architectures

Labs

Lab 1: Exploring Cryptographic Technologies

Lab 2: Configure and Verify AAA

Lab 3: Configuration Management Protocols

Lab 4: Securing Routing Protocols

Lab 5: VLAN Security and ACLs on Switches

Lab 6: Port Security and Private VLAN Edge

Lab 7: Securing DHCP, ARP, and STP

Lab 8: Explore Firewall Technologies

Lab 9: Cisco ASA Interfaces and NAT

Lab 10: Site-to-Site VPN

Lab 11: Clientless Remote Access VPN

Lab 12: Configure DHCP Snooping and STP Protection

Lab 13: Configure Interfaces and NAT on the Cisco ASA


CCNP

Crash Course / Exam Preparation Course / 1-on-1 Course

AT Computer Solution Limited is offered Crash Course / Exam Preparation Course. It will focus on the best paths to take education to help you advance in your career. It will help you to get a professional certificate easily.

 

Advantages of 1-on-1 Training are:

  • You can start from Any Date.
  • Fully customized course to suit your training need.
  • You get a personal trainer for the entire duration of the boot camp.
  • Better quality. Quality of instruction has an inverse relation with the number of students in a class.
  • Quicker learning since you receive undivided attention of the trainer. You don't have to wait for your turn to seek an explanation

 

CCNP Route (300-101)

Part I: Fundamental Routing Concepts

Chapter 1. Characteristics of Routing Protocols

Chapter 2. Remote Site Connectivity

 

Part II: IGP Routing Protocols

Chapter 3. IPv6 Review and RIPng

Chapter 4. Fundamental EIGRP Concepts

Chapter 5. Advanced EIGRP Concepts

Chapter 7. Fundamental OSPF Concepts

Chapter 8. The OSPF Link-State Database

Chapter 9. Advanced OSPF Concepts

 

Part III: Route Redistribution and Selection

Chapter 10. Route Redistribution

Chapter 11. Route Selection

 

Part IV: Internet Connectivity

Chapter 12. Fundamentals of Internet Connectivity

Chapter 13. Fundamental BGP Concepts

Chapter 14. Advanced BGP Concepts

Chapter 15. IPv6 Internet Connectivity

 

Part V: Router and Routing Security

Chapter 16. Fundamental Router Security Concepts

Chapter 17. Routing Protocol Authentication

 

CCNP Switch (300-115)

Part I: Designing Campus Networks

Chapter 1. Enterprise Campus Network Design

Chapter 2. Switch Operation

Chapter 3. Switch Port Configuration

 

Part II: Building a Campus Network

Chapter 4. VLANs and Trunks

Chapter 5. VLAN Trunking Protocol

 

Part III: Working with Redundant Links

Chapter 6. Traditional Spanning Tree Protocol

Chapter 7. Spanning-Tree Configuration

Chapter 8. Protecting the Spanning Tree Protocol Topology

Chapter 9. Advanced Spanning Tree Protocol

Chapter 10. Aggregating Switch Links

 

Part IV: Multilayer Switching

Chapter 11. Multilayer Switching

Chapter 12. Configuring DHCP

 

Part V: Monitoring Campus Networks

Chapter 13. Logging Switch Activity

Chapter 14. Managing Switches with SNMP

Chapter 15. Monitoring Performance with IP SLA

Chapter 16. Using Port Mirroring to Monitor Traffic

 

Part VI: Implementing High Availability

Chapter 17. Understanding High Availability

Chapter 18. Layer 3 High Availability

 

Part VII: Securing Switched Networks

Chapter 19. Securing Switch Access

Chapter 20. Securing VLANs

Chapter 21. Preventing Spoofing Attacks

Chapter 22. Managing Switch Users

 

CCNP TSHOOT (300-135)

Part I Fundamental Troubleshooting and Maintenance Concepts

Chapter 1 Introduction to Troubleshooting and Network Maintenance

Chapter 2 Troubleshooting and Maintenance Tools

Chapter 3 Troubleshooting Device Performance

 

Part II Troubleshooting Cisco Catalyst Switch Features

Chapter 4 Troubleshooting Layer 2 Trunks, VTP, and VLANs

Chapter 5 Troubleshooting STP and Layer 2 EtherChannel

Chapter 6 Troubleshooting Inter-VLAN Routing and Layer 3 EtherChannels

Chapter 7 Troubleshooting Switch Security Features

Chapter 8 Troubleshooting First-Hop Redundancy Protocols

 

Part III Troubleshooting Router Features

Chapter 9 Troubleshooting IPv4 Addressing and Addressing Technologies

Chapter 10 Troubleshooting IPv6 Addressing and Addressing Technologies

Chapter 11 Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists

Chapter 12 Troubleshooting Basic IPv4/IPv6 Routing and GRE Tunnels

Chapter 13 Troubleshooting RIPv2 and RIPng

Chapter 14 Troubleshooting EIGRP

Chapter 15 Troubleshooting OSPF

Chapter 16 Troubleshooting Route Maps and Policy-Based Routing

Chapter 17 Troubleshooting Redistribution

Chapter 18 Troubleshooting BGP

 

Part IV Troubleshooting Management

Chapter 19 Troubleshooting Management Protocols and Tools

Chapter 20 Troubleshooting Management Access

--------------------------END-----------------------------

If you have any question regarding the above course outline please call - 01711452688.

 


RHCE

Crash Course / Exam Preparation Course / 1-on-1 Course

AT Computer Solution Limited is offered Crash Course / Exam Preparation Course. It will focus on the best paths to take education to help you advance in your career. It will help you to get a professional certificate easily.

 

Advantages of 1-on-1 Training are:

  • You can start from Any Date.
  • Fully customized course to suit your training need.
  • You get a personal trainer for the entire duration of the boot camp.
  • Better quality. Quality of instruction has an inverse relation with the number of students in a class.
  • Quicker learning since you receive undivided attention of the trainer. You don't have to wait for your turn to seek an explanation

 

AT Computer Solution Limited

RHCE Course Outline

Total 110 Hours

One Class = 06 Hours Friday Evening Batch (3:30pm-9:30pm) /

                     Friday Morning 4 hours (9am – 1pm) & Saturday Evening 2 hours (7:30pm-9:30pm)

Red Hat System Administration I (RH124)

Chapter 1 : Accessing the Command Line

Chapter 2: Managing Files From the Command Line

Chapter 3: Getting Help in Red Hat Enterprise Linux [Without LAB]

Chapter 4: Creating, Viewing, and Editing Text Files

ONE Class

 

 

Chapter 5: Managing Local Linux Users and Groups

Chapter 6: Controlling Access to Files With Linux File System Permission

Chapter 8: Controlling Services and Daemons

Chapter 11: Managing Red Hat Enterprise Linux Networking

ONE Class

 

 

Chapter 12: Archiving and Copying Files Between Systems

Chapter 13: Installing and Updating Software Packages

Chapter 14: Accessing Linux file Systems

ONE Class

 

*** Exam Class

 

Red Hat System Administration II (RH134)

Chapter 2 : Using Regular Expression With grep

Chapter 3 : Creating and Editing Text files with vim

Chapter 4 : Scheduling Future Linux Tasks

Chapter  6: Controlling Access to Files With Access Control lists (ACLs)

Chapter 7 : Managing SELinux Security

ONE Class

 

 

Chapter 8: Connecting to Network-defined Users and Groups

Chapter 9: Adding Disks, Partitions, and File System to a Linux System

Chapter 10: Managing Logical Volume Management (LVM) Storage

ONE Class

 

 

Chapter 11: Accessing Network Storage with Network File System (NFS)

Chapter 13: Controlling and Troubleshooting the Red Hat  Enterprise Linux Boot Process

Chapter 14: Limiting Network Communication with firewalld

ONE Class

 

*** Exam Class

Red Hat System Administration III (RH254)

Chapter 1: Controlling Services and Daemons

Chapter 2: Managing IPv6 Networking

Chapter 3: Configuring Link Aggregation and Bridging

ONE Class

 

 

Chapter 4: Network Port Security

Chapter 5: Managing DNS for Servers

Chapter 6: Configuring Email Transmission

Chapter 7: Providing Remote Block Storage

ONE Class

 

*** Exam Class

 

Chapter 8: Providing File-based Storage

Chapter 9: Configuring MariaDB Databases

Chapter 10: Providing Apache HTTPD Web Service

ONE Class

 

 

Chapter 11:Writing Bash Scripts

Chapter 12: Bash Conditionals and Control Structures

Chapter 13: Configuring the Shell Environment

ONE Class

*** Exam Class

 

 

Exam Preparation:   20 Hours

Project:   18 Hours

 

If you have any query please feel free call - 01711452688


MCSA

Crash Course / Exam Preparation Course / 1-on-1 Course

AT Computer Solution Limited is offered Crash Course / Exam Preparation Course. It will focus on the best paths to take education to help you advance in your career. It will help you to get a professional certificate easily.

 

Advantages of 1-on-1 Training are:

  • You can start from Any Date.
  • Fully customized course to suit your training need.
  • You get a personal trainer for the entire duration of the boot camp.
  • Better quality. Quality of instruction has an inverse relation with the number of students in a class.
  • Quicker learning since you receive undivided attention of the trainer. You don't have to wait for your turn to seek an explanation

MCSA: Microsoft Windows Server 2012 Course Outline / Crash Course

Per class 2 (two) hours

Project: 15 Hours (Real Life - Hands on Lab)

70-410 = Installing and Configuring Windows Server 2012

1.    Install and configure servers
      i.    Install server
      ii.    Configure local storage
2.    Configure server roles and features
      i.    Configure file and share access
      ii.    Configure print and document services
3.    Configure Hyper-v
      i.    Create and configure virtual machine settings
      ii.    Create and configure virtual machine storage
      iii.    Create and configure virtual networks
4.    Deploy and configure core network services
      i.    Deploy and configure Dynamic Host Configuration Protocol (DHCP) service
      ii.    Deploy and configure DNS service
5.    Install and configure active directory
      i.    Install domain controllers
      ii.    Create and manage Active Directory users and computers
      iii.    Create and manage Active Directory groups and organizational units (OUs)
6.    Create and manage group policy
      i.    Create Group Policy objects (GPOs)
      ii.    Configure security policies
      iii.    Configure Windows Firewall

 

70-411 = Administering Windows Server 2012


1.    Deploy, manage and maintain servers
       i.    Deploy and manage server images
       ii.    Monitor servers
2.    Configure file and print services
       i.    Configure Distributed File System (DFS)
       ii.    Configure File Server Resource Manager (FSRM)
       iii.    Configure file and disk encryption
       iv.    Configure advanced audit policies
3.    Configure network services and access
       i.    Configure DNS zones
       ii.    Configure DNS records
       iii.    Configure NAT and routing
4.    Configure network policy server infrastructure
       i.    Configure Network Access Protection (NAP)
5.    Configure and manage active directory
       i.    Configure domain controllers
       ii.    Maintain Active Directory
       iii.    Configure account policies
6.    Configure and manage group policy
       i.    Configure Group Policy processing
       ii.    Configure Group Policy settings
       iii.    Manage Group Policy objects (GPOs)
       iv.    Configure Group Policy preferences (GPP)


70-412 = Configuring Advanced Windows Server 2012 Services


1.    Configure and manage high availability
       i.    Configure Network Load Balancing (NLB)
       ii.    Configure failover clustering
2.    Configure file and storage services
       i.    Configure advanced file services
       ii.    Implement Dynamic Access Control (DAC)
3.    Implement business continuity and recovery
       i.    Configure and manage backups
       ii.    Recover servers
4.    Configure network services
       i.    Implement an advanced Dynamic Host Configuration Protocol (DHCP) solution
       ii.    Deploy and manage IP Address Management (IPAM)
5.    Configure active directory infrastructure
       i.    Configure a forest or a domain
       ii.    Configure trusts
       iii.    Configure sites
6.    Configure identity and access solutions
       i.    Install and configure Active Directory Certificate Services (AD CS)
       ii.    Install and configure Active Directory Rights Management Services (AD RMS)

Course Fee: Per subject 8,000X3 = 24,000 Taka

Per class 2 (two) hours, total 24 classes

*** We assure your 100% learning guaranty and MCSA pass guaranty otherwise we will refund your course fee and exam fee.

 


Close

ADMISSION FORM



* Name :
Parent/Guardian :
Permanent Address :
* Current Address :
* Email :
* Phone :
* Course Title :
Sex :
Date of Birth :
Computer Knowledge :
Reference :
* Last Education :
* Occupation :
Terms & Condition:
  1. Studentship will be terminated if two uninterrupted weeks are absent.
  2. Students are bound to follow the given class schedule.


Close
965/1, Shewrapara, Kafrul, Dhaka -1216

CONTACT FORM

Personal Information
* Name :
Professional Information
Office :
Designation :
Contact Information
* Mobile :
* Email :
Academic Information
Last Education :
Other Qualification :


Close
965/1, Shewrapara, Kafrul, Dhaka -1216

AT Computer Training Survey

Student Information
* Name :
Email :
* Student ID :
Contract Number :
Course :
Section One: Instructor

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

Please share any comments you have about the instructor:
Section Two: Curriculum

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

  • No. There was not nearly enough time.
  • No. There was not enough time.
  • Yes
  • No. There was not enough material.
  • No. There was not nearly enough material.

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

Please share any comments you have on the training format and materials:
Section Three: Facility

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

Please share any comments you have about the facilities:
Section Four: Overall
Suggestion box: Our model is continual improvement. We invite you to suggest specific improvements.


Please share any comments you have about the facilities:


Please share any comments you have about the facilities:
Close

Forgot ID or Password ?
Don't have account?
Close
Close

0.0673