سر فصلها
Introduction
• Overview of networking
• Overview of workgroup
• Overview of domain
• Overview of client
• Overview of server
Protocols and ports
• Overview of Protocols and ports
• Overview of Protocol types
• Overview of SSH
• Overview of DNS
• Overview of SMTP
• Overview of FTP
• Overview of TFTP
• Overview of TELNET
• Overview of SSH
• Overview of DHCP
• Overview of HTTP
• Overview of HTTPS
• Overview of SNMP
• Overview of RDP
• Overview of NTP
• Overview of SIP
• Overview of SMB
• Overview of POP3
• Overview of IMAP4
• Overview of ICMP
• Overview of UDP
• Overview of TCP
• Overview of IP
• Overview of Connection-oriented vs. connectionless
• Overview of port number classification
Devices, Applications, Protocols, and Services at Each OSI Layers
• Overview of OSI model
• Overview of Layer 7
• Overview of Layer 6
• Overview of Layer 5
• Overview of Layer 4
• Overview of Layer 3
• Overview of Layer 2
• Overview of Layer 1
Devices, Applications, Protocols, and Services at Each TCP/IP Layers
• Overview of TCP/IP model
• Overview of Layer 1
• Overview of Layer 2
• Overview of Layer 3
• Overview of Layer 4 / 5
Concepts and Characteristics of Routing and Switching
• Overview of network traffic
• Overview of Broadcast domains
• Overview of CSMA/CD
• Overview of CSMA/CA
• Overview of Protocol data units
• Overview of MTU
• Overview of Broadcast
• Overview of Multicast
• Overview of Unicast
• Overview of Segmentation and interface properties
• Overview of ARP table
• Overview of Routing
• Overview of Routing protocols
• Overview of Distance-vector routing protocols
• Overview of Link-state routing protocols
• Overview of Routing types
• Overview of Static
• Overview of Dynamic
• Overview of QoS
• Overview of NAT/PAT
Internet Protocol Addressing
• Overview of NIC
• Overview of MAC address
• Overview of Private vs. public
• Overview of Loopback and Apipa
• Overview of Default gateway
• Overview of Subnet mask
• Overview of Subnetting
• Overview of Supernetting
• Overview of Classes A, B, C, D, and E
• Overview of CIDR
• Overview of Address assignments
• Overview of DHCP
• Overview of APIPA
• Overview of Loopback
Network Topologies
• Overview of Wired Topologies
• Overview of Logical vs. Physical
• Overview of Star
• Overview of Mesh
• Overview of Bus
• Overview of Tree
• Overview of Hybrid
• Overview of Ring
• Overview of LAN
• Overview of WLAN
• Overview of MAN
• Overview of WAN
• Overview of CAN
• Overview of SAN
• Overview of PAN
Wireless Technologies and Configurations
• Overview of Wireless Topologies
• Overview of Ad hoc
• Overview of Infrastructure
• Overview of 802.11 standards:
o 802.11a
o 802.11b
o 802.11g
o 802.11n
o 802.11ac
o 802.11ax
o 802.11be
• Overview of Radio Frequencies:
o 2.4 GHz
o 5.0 GHz
• Overview of Speed and distance requirements
• Overview of Channel bandwidth
• Overview of Unidirectional/omnidirectional
• Overview of Wireless Security
Cabling
• Overview of Media types
• Overview of Copper
• Overview of UTP
• Overview of STP
• Overview of Coaxial
• Overview of Fiber
• Overview of Single-mode
• Overview of Multimode
• Connector types
• Overview of Copper
• Overview of RJ-45
• Overview of RJ-11
• Overview of BNC
• Overview of F-type
• Overview of Fiber
• Overview of LC
• Overview of ST
• Overview of SC
• Overview of MTRJ
• Overview of Transceivers
• Overview of SFP
• Overview of SFP+
• Overview of QSFP
• Overview of Characteristics of fiber transceivers
• Overview of Half Duplex
• Overview of Full Duplex
• Overview of Single mode
• Overview of Multiple mode
• Overview of Patch panel
• Overview of Copper cable standards
• Overview of Cat 3
• Overview of Cat 5
• Overview of Cat 5e
• Overview of Cat 6
• Overview of Cat 6a
• Overview of Cat 7
• Overview of RG-6
• Overview of RG-59
• Overview of Copper termination standards
• Overview of TIA/EIA 568a
• Overview of TIA/EIA 568b
• Overview of Crossover
• Overview of Straight-through
• Overview of Ethernet deployment standards
• Overview of 100BASE-T
• Overview of 1000BASE-T
• Overview of 1000BASE-LX
• Overview of 1000BASE-SX
• Overview of 10GBASE-T
Appropriate placement of Networking devices on a network
• Firewall
• Router
• Switch
• Hub
• Bridge
• Wireless access point
Networking Attacks
• Overview of DoS
• Overview of DDoS
• Overview of Social engineering
• Overview of Rogue access point
• Overview of Phishing
• Overview of Ransomware
• Overview of Brute force
• Overview of Man-in-the-middle
• Overview of Exploits and vulnerabilities
Configuration and Commands
• Configuring and managing NIC by GUI
• Configuring and managing NIC by Command
• Configuring Networking between devices
• ping
• ipconfig
• ARP
• getmac
• nslookup
• pathping
• tracert
• Optional: Overview and installing cisco packet tracer
• Optional: Capturing frames
• Optional: Overview of Ethernet frame
• Optional: Basic configuration of Router (CLI)
• Optional: Basic configuration of Switch (CLI)
• Optional: Overview of Dynamic Routing
• Optional: Overview of Static Routing
• Optional: Overview of Autonomous System, EGP and BGP
• Optional: Configuring Static Route
Virtualization
• Overview of Virtualization
• Installing VMWare Workstation
• Configuring and Managing VMWare Workstation
• Creating Virtual Machines
• Configuring Virtual Machines
• Managing Virtual Machines
• Configuring VMWare Workstation Storage
• Configuring VMWare Workstation Networking
• Advance Settings of VMWare Workstation
Installing Windows 11
• Overview of Windows 11 and Workgroup
• Navigating the User Interface
• Comparing Different Versions and Architectures
• Overview of Different Types of Installation
• Overview of Sysprep and OOBE
• Using Sysprep to Change SID
• Installing Windows 11
• Basic Configuration
• Upgrading to Windows 11
• ***Optional: Using Hiren and Reseting Password
Users, Groups and Profile
• Overview of User and Built in Groups
• Common Configuration Options
• Managing User Accounts
• Managing Groups
• Managing Users and Groups by Commands
• Creating Mass User Creation
• Overview of Different Types of Profile
• Managing Local Profile
Network Connectivity
• Overview of Networking
• Configuring IP Network Connectivity
• Configuring Networking and Virtual Switch
Storage
• Overview of Different Types of Storage
• Overview of Different Types of File System
• Overview of Different Types of RAIDS
• Managing Disks
• Overview of MBR and GPT
• Creating Basic Partitions, Primaty, Extended and Logical
• Creating Dynamic Volumes, Simple, Spanned, Striped and Mirror
• Creating Virtual Hard Disks
• Managing Partitions and Volumes
• Managing Disks, Partitions and Volumes by Command
• File Systems and Allocation Unit Size
• Creating and Managing Storage Spaces and Pools
• Overview of Redundancy in Storage Spaces
• Managing 1 Way and 2 Way Mirror
• Managing RAID 5
• Advance Settings of Storage
• Creating Bootable USB by CMD
• Creating Bootable USB by Rufus
• Managing BIOS Partitions
• Managing UEFI Partitions
Managing Files and Printers
• Overview of File and Printers
• Configuring and Managing Printers
• Configuring and Managing File Access
• Configuring and Managing Shared Folders
• Configuring and Managing Offline File
• Configuring and Managing Map Networtk Drive
• Overview of Administrative Shares
• Creating Hidden Share
• Disabling Administrative Shares by Registry
Implementing Group Policy
• Overview of Local Group Policy
• Managing Local Group Policy
• Configuring and Managing Password Policies
• Configuring and Managing Account Lockout Policies
• Configuring and Managing Audit Policies
• Configuring and Managing User Right Assignments
• Configuring and Managing Security Options
• Configuring and Managing Application Control Policies
• Configuring and Managing Administrative templates Sub Policies
BIOS
• Overview of Power on Self-Test
• Overview of UEFI
• Overview of Legacy Traditional
Security
• Overview of Data-Related Security Threats and Access Control List (ACL)
• Overview of Device Security
• Overview of Using Security Settings to Mitigate Threats
• Overview of User Account Control
• Overview of NTFS Permissions, Inheritance, Default Permissions
• Managing NTFS Permissions
• Managing Share Permissions
• Overview of Encryption File System (EFS)
• Securing Data with EFS
• Creating Recovey Agent Key for EFS
• Implementing and Managing BitLocker
• Managing User Account Control
• Overview of Network-Related Security Threats
• Configuring and Managing Windows Firewall
• Configuring and Managing Connection Security Rules
• Configuring and Managing Windows Defender
Troubleshooting and Recovery
• Overview of Devices and Drivers
• System Image Backup
• Recovering Files and Images
• Restore Point
• File History
• Previous Version Tab
• ***Optional: Overview of Veeam
Maintaining Windows 11
• Overview of Maintenance
• Updating Windows
• Monitoring Windows 11
• Optimizing Performance
• Performance Monitor
• Resource Monitor
Remote Desktop
• Overview of Remote Desktop
• Configuring and Managing Remote Desktop
• Configuring and Managing Remote Desktop Assistance
• Advance Settings of Remote Desktop
• Overview of Team Viewr and Anydesk
• Changing RDP Port by Registry
• ***Optional: Overview of VDI
Virtualization
• Overview of Virtualization
• Installing VMWare Workstation
• Configuring and Managing VMWare Workstation
• Creating Virtual Machines
• Configuring Virtual Machines
• Managing Virtual Machines
• Configuring and Managing VMWare Workstation Storage
• Configuring VMWare Workstation Networking
• Advance Settings VMWare Workstation
Installing, Upgrading, and Migrating servers and workloads
• Introducing Windows Server
• Preparing for Upgrades
• Upgrading Windows Server
• Managing Windows Server
• Overview of Windows Server Dashboard
• Overview of Roles and Features
Active Directory
• Overview of Domain
• Installing Active Directory Domain Services
• Creating and Configuring Forest and Domain Controller
• Overview of Active Directory Users and Computers
• Managing Active Directory Container
• Implementing and Managing OUs in Active Directory
• Creating and Managing User Accounts in Active Directory
• Creating and Managing Groups in Active Directory
• Managing Computer Accounts in Active Directory
• Managing Users by User Template
• Configuring and Managing Additional Domain Controllers
• Overview of Install from Media
• Configuring Additional Domain Controllers by IFM
• Configuring and Managing Read-Only Domain Controllers
• Configuring Pre-Stage or Pre-Created Read-Only Domain Controllers
• Performing Bulk Active Directory Operations
• Demoting DC and Removing Metadata
• Joining Computers to Domain by Using GUI
• Joining Computers to Domain by Using PowerShell and CMD
• Using Offline Join
• Introducing PowerShell in Active Directory
• Configuring and Managing Active Directory by CMD
• Configuring and Managing Active Directory by PowerShell
• Advance Settings of Active Directory
• Troubleshooting Active Directory Installations
• Overview of Kerberos
• Overview of NTLM
• Overview of LDAP
• Overview of Mass User Creation
• Creating Multiple Users by CSVDE and LDIFDE
• Redirect Users and Computers to a Specific OU
Account and Profile
• Overview of Account Tab
• Overview of Profile Tab
• Overview of Local Profile, Roaming Profile, Mandatory Profile
• Configuring and Managing Roaming Profile
Group Policy
• Overview of Domain Group Policy
• Overview of Group Policy Storage, Linking, Hierarchy
• Creating and configuring GPOs
• Administering GPOs
• Managing Group Policy Tabs, Inheritance, Starter GPO, Copy GPO
• Configuring and Managing WMI Filtering and Queries
• Configuring and Managing Password Policy and Lockout Policy by GPO
• Configuring and Managing Password Setting Object (PSO) by GPO
• Configuring and Managing Kerberos and Audit Policy by GPO
• Configuring and Managing User Right Assignment and Delegation by GPO
• Configuring and Managing Security Options by GPO
• Configuring and Managing Restricted Group, System by GPO Service
• Configuring and Managing Firewall by GPO Service
• Configuring and Managing App Locker by GPO Service
• Configuring and Managing Software Installation by GPO Service
• Overview of Policies for Group Policy
• Configuring and Managing Loopback Processing, Replace and Merge
• Implementing Administrative Templates
• Configuring and Managing Group Policy Preferences
• Planning Group Policy
• Configuring and Managing Group Policy Modeling
• Configuring and Managing Group Policy Results
• Backup and Restore GPOs
Backup and Recovery
• Overview of Backup and Restore in Windows server
• Overview of Active Directory Backup and Restore in Windows server
• Creating Active Directory Full and System State Backup
• Using Authoritative and Non-Authoritative Recovery
• Creating, Managing and Restoring Active Directory Snapshot
• Managing and Restoring Recycle Bin in Active Directory
• Using Tombstone for Recovery
• Overview of Incremental and Decremental Backup
• ***Optional: Overview of Veeam
Monitoring
• Overview of Windows Server 2025 Monitoring Tools
• Using Performance Monitor
• Monitoring Event Logs
• Establishing a Performance Baseline
Dynamic Access Control (DAC) and NIC Teaming
• Overview of Dynamic Access Control
• Configuring and Managing DAC
• Overview of NIC Teaming
• Overview of Teaming Modes
• Overview of load Balancing
• Configuring and Managing NIC Teaming
Internet Information Services (IIS)
• Overview of Internet Information Services (IIS)
• Creating and Managing FTP and Web Site in IIS
Dynamic Host Configuration Protocol (DHCP)
• Overview of the DHCP Role Service
• Planning a DHCP Server Implementation
• Installing and Configuring DHCP Server
• Validating the DHCP Server Implementation
• Creating and Managing Scopes and Options
• Creating and Managing Super Scope
• Creating and Managing Multicast Scope
• Creating and Managing Split Scope
• Creating and Managing Failover by Built in DHCP Failover
• Creating and Managing DHCP Policies
• Managing DHCP by Commands
• Overview of DHCP and BOOTP
• Overview of Time 1 and Time 2
• Overview of Lease Duration
• Monitoring DHCP
• Advance Settings of DHCP
Domain Name Service (DNS)
• Overview of NetBIOS Name
• Overview of Fully Qualify Domain Name
• Overview of DNS and WINS Servers
• Planning DNS Name Resolution
• Implementing DNS servers
• Overview of Standard and Active Directory Integrated Zones
• Overview of Forward Look up Zone
• Overview of Revers Lookup Zone
• Configuring and Managing Primary Zone
• Creating and Managing Secondary Zone
• Creating and Managing Stub Zone
• Overview of Records
• Managing A, AAAA, CNAME, PTR, MX and SRV Records
• Managing DNS Zone Tabs
• Managing DNS Server Tabs
• Managing Advanced DNS Settings
• Configuring and Managing Scopes
• Overview of Recursive and Iterative
• Configuring and Managing Caching Only DNS Server
• Configuring and Managing Root DNS Server
• Configuring and Managing DNS Delegation
• Configuring and Managing DNS Policies
• Configuring and Managing Global Name Zone
• Configuring and Managing Forwarder and Conditional Forwarder
• Configuring and Managing Advance Round Robin by PowerShell and Policies
• Overview of DNS Threats and Mitigations
• Securing DNS Server
• Troubleshooting DNS
• Advance Settings of Domain Name Service
Internet Protocol Address Management (IPAM)
• Overview of IPAM
• Deploying IPAM
• Installing and Configuring IPAM Server
• Managing IP Address Spaces and Blocks by Using IPAM
• Managing DHCP Servers by Using IPAM
• Managing DNS Servers by Using IPAM
• Advance Settings of Internet Protocol Address Management
Routing and Remote Access Server (RRAS)
• Overview of Routing and Remote Access in Windows Server
• Overview of Network Address Translation (NAT)
• Implementing NAT
• Configuring and Managing Server as a Router
• Overview of Virtual Private Network (VPN)
• Configuring and Managing VPN Remote Access
• Configuring and Managing DHCP Relay Agent
File Server Resource Manager (FSRM)
• Overview of Disk Quota
• Configuring and Managing Disk Quota
• Overview of File Server Resource Manager (FSRM)
• Configuring and Managing Folder Quota
• Configuring and Managing a File screening to a Volume or Folder
• Configuring and Managing Storage Reports Management
• Managing Quota and File Screening Templates
• Advance Settings of File Server Resource Manager
Distributed File System (DFS) and DFS-Replication
• Overview of Distributed File System (DFS)
• Configuring and Managing DFS Namespaces
• Overview of Distributed File System Replication
• Configuring and Managing DFS Replication
• Managing DFS Replication Groups
• Configuring Advance Tabs of DFS
Server Core
• Overview of Server Core
• Installing Server Core
• Managing Server Core
• Configuring Server Core
• Using CMD and PowerShell to Configure Server Core
• Using Remote Access to Configure Server Core
• Installing Active Directory on a Server Core
• Configuring and Managing Server Core as a Domain Controller
• Configuring and Managing Server Core as an Additional Domain Controller
• Configuring and Managing Server Core as a Read Only Domain Controller
IPSec
• Overview of Man in the Middle Attack
• Overview of IPSec
• Overview of Microsoft Network Monitor and Wireshark
• Securing FTP connection by Using IPSec
Service Account
• Overview of Service Account
• Managing Service Accounts
• Creating and Managing Standalone Managed Service Account (sMSA)
• Creating and Managing Group Managed Service Account (gMSA)
• Creating and Managing Virtual Group Service Account
IPv4 and IPv6
• Overview of IPv4 and IPv6
• Overview IPv6
• Subnetting
• Superneting
IPSec
• Overview of IPv4
• Overview of IPv6
• Subnetting
• uperneting
Active Directory Domain and Trust (ADDT)
• Overview of Root Tree Domains and Child Domains
• Configuring and Managing Child Domain Controllers
• Configuring and Managing Root Tree Domain Controllers in the Same Forest
• Overview of Forest, External, Realm, Parent-Child, Root Tree Domain and Shortcut Trusts
• Configuring and Managing Forest, External, Realm, and Shortcut Trusts
• Configuring and Managing Forest-Wide Authentication and Selective authorization
• Configuring and Managing SID Filtering
• Configuring and Managing Name Suffix Routing
• Advance Settings of Active Directory Domain and Trust
Active Directory Site and service (ADSS)
• Overview of Active Directory Domain Controllers Replication
• Configuring and Managing Active Directory Sites
• Configuring and Managing Active Directory Subnets
• Configuring and Managing Site Links
• Overview of Knowledge Consistency Checker (KCC)
• Configuring and Managing Replication Topology
• Overview of Active Directory Partitions
• Configuring and Managing ADDS Intra-Site Replication
• Creating and Managing Site Link Bridges
• Manage Registration of SRV Records
• Managing Replication by Command
• Monitoring and Troubleshooting ADDS Replication
• Advance Settings of Active Directory Site and service
Active Directory Certificate Service (ADCS)
• Overview of Encryption
• Overview of Symmetric and Asymmetric Encryption
• Overview of Certificate and Digital Signature
• Overview of ADCS Role Service
• Choosing between a standalone and an enterprise CA
• Choosing between a root and a subordinate CA
• Overview of different role Service of ADCS
• Installing and Configuring Certificate Authority
• Configuring and Managing Online/Offline Root and Subordinate CAs
• Configuring and Managing Certificate Templates
• Enrolling Certificate Manually
• Auto Enrolling Certificate by GPO
• Installing and Configuring CA Web Enrollment Role Service
• Enrolling Certificate by using CA Web Enrollment
• Exporting and Importing Certificates
• Using Internal CA for Publishing a HTTPS Web Site
• Configuring and Managing Revocation
• Troubleshooting and Maintaining CAs
Active Directory Rights Management Services (ADRMS)
• Overview of ADRMS
• Installing ADRMS
• Configuring and Managing ADRMS
• Configuring and Managing Rights Policy Templates
• Configuring and Managing Exclusion Policies
• Configuring and Managing Security Policies
• ADRMS Backup and Restore
• Configuring Client Side to Use ADRMS
• Using ADRMS on Clients to Protect Data
• Advance Settings of Active Directory Rights Management Services
Advance Active Directory Configuration
• Overview of Active Directory Defragmentation
• Configuring Offline Active Directory Defragmentation
• Changing Directory Restore Mode Password
• Changing Source of Windows server Roles and Feature
• Changing Tombstone Lifetime
• Managing Default Workstation Number a User Can Join to the domain
• Renaming Domain Name
Storage and Share
• Overview of SMB and NFS
• Configuring and Managing Share Folders
• Planning Storage Requirements
• Configuring and Managing iSCSI Target Server
• Overview of Storage Replication
• Configuring and Managing Storage Replication
• Overview of Data Deduplication
• Configuring and Managing Data Deduplication
Failover Clustering
• Overview of Failover Cluster
• Planning a Failover Cluster
• Configuring and Managing Failover Cluster
• Configuring and Managing Cluster Networking
• Configuring and Managing Cluster Storage
• Configuring and optimizing Clustered Shared Volumes (CSVs)
• Configuring and Managing Quorum
• Configuring and Managing Disk and File Share Witness
• Configuring and Managing Failover Cluster for DHCP
• Configuring and Managing Failover Cluster for File Server
• Verifying High Availability
• Maintaining and Troubleshooting Failover Cluster
• Advance Settings of Failover Cluster
Network Load Balancing (NLB)
• Overview of NLB
• Configuring NLB Cluster
• Planning NLB Implementation
• Configuring and Managing the NLB Cluster
• Managing Affinity
• Managing Unicast, Multicast and IGMP
• Managing Cluster Operation Modes
• Managing Cluster Filtering Modes
• Validating High Availability for NLB Cluster
Flexible Single Master Operations (FSMO) and Functional Levels
• Overview of Flexible Single Master Operations
• Managing Domain Naming and Schema Operation Master Roles
• Managing RID, PDC and Infrastructure Operation Master Roles
• Transferring Operation Master Roles (GUI)
• Transferring Operation Master Roles (Command)
• Seizing Operation Master Roles
• Overview of Domain and Forest Functional Level
• Managing Domain Functional Level
• Managing Forest Functional Level
Nested Groups
• Overview of Active Directory Nested Groups
• Managing Universal, Global and Local Groups
• Managing Security and Distribution Groups
Print Server
• Overview of Windows printer deployments
• Overview of Printer Permissions
• Configuring and Managing Printer
• Overview of Spooling and Advance Tab Options
• Configuring and Managing Shared Printer and Deployment Types
• Overview of Printer Pooling
• Configuring Printer Pooling
***Optional Extra
• Overview of Unified Threat Management (UTM)
• Configuring and Managing Kerio Control (UTM)
• Practical Scenario: Publishing Website by Using Public IP Address, Domain Name and Kerio UTM on the Internet
• Practical Scenario: Publishing FTP Site by Using Public IP Address, Domain Name and Kerio UTM on the Internet
• Practical Scenario: Remote Desktop by Using Public IP Address, Domain Name and Kerio UTM on the Internet
• Practical Scenario: VPN Remote Access (Routing and Remote Access Server) by Using Public IP Address, Domain Name and Kerio UTM on the Internet
• Overview of Windows Deployment Service (WDS)
• Configuring and Managing WDS
• Overview of Windows Server Update Services (WSUS)
• Configuring and Managing WSUS