MCSA PACK 2025آنلاین

تاریخ شروع:
  • 1404/08/10
  • 1404/08/16
  • 1404/08/22
شهریه دوره: 13,800,000 تومان
دپارتمان فناوری اطلاعات و ارتباطات (IT)
مدت زمان 230 ساعت
حضوری / آنلاین ترکیبی
شروع دوره 10 آبان 1404
روزهای برگزاری شنبه، چهارشنبه
ساعات برگزاری 17:30–21:00
ثبت نام
شهریه دوره: 13,800,000 تومان
دپارتمان فناوری اطلاعات و ارتباطات (IT)
مدت زمان 230 ساعت
حضوری / آنلاین ترکیبی
شروع دوره 16 آبان 1404
روزهای برگزاری جمعه
ساعات برگزاری 09:00–13:00
ثبت نام
شهریه دوره: 13,800,000 تومان
دپارتمان فناوری اطلاعات و ارتباطات (IT)
مدت زمان 230 ساعت
حضوری / آنلاین ترکیبی
شروع دوره 22 آبان 1404
روزهای برگزاری پنج‌شنبه
ساعات برگزاری 15:00–20:00
ثبت نام
MCSA PACK 2025آنلاین
توضیحات دوره
در دنیای امروز، فناوری اطلاعات و سیستم‌های کامپیوتری بخش جدایی‌ناپذیری از زندگی روزمره و کسب‌وکارها هستند و آشنایی با نحوه مدیریت سیستم‌عامل‌ها به یک مهارت حیاتی تبدیل شده است. دوره MCSA PACK 2025 در مجتمع فنی تهران نمایندگی زعفرانیه فرصتی استثنایی برای علاقه‌مندان به حوزه فناوری اطلاعات فراهم می‌کند تا علاوه بر یادگیری مفاهیم پایه، تجربه عملی در مدیریت سیستم‌های مایکروسافت را نیز کسب کنند.

این دوره با طراحی آموزشی جامع، به دانش‌پذیران کمک می‌کند تا با اصول و کاربردهای سیستم‌عامل‌های مایکروسافت آشنا شوند. تمرکز اصلی بر ایجاد درک عمیق و کاربردی است، به طوری که هر دانش‌پذیر بتواند به سرعت با محیط‌های کاری واقعی ارتباط برقرار کند و توانایی مدیریت و پیکربندی سیستم‌ها را به دست آورد. شرکت‌کنندگان با نحوه عملکرد سیستم‌ها، نصب و راه‌اندازی، مدیریت منابع و امنیت و روش‌های بهینه‌سازی عملکرد سیستم‌ها آشنا می‌شوند، بدون اینکه وارد جزئیات فنی پیچیده‌ای شوند که ممکن است باعث سردرگمی شود.

یکی از ویژگی‌های برجسته این دوره، تاکید بر یادگیری تجربی و عملی است. آموزش‌ها به گونه‌ای طراحی شده‌اند که شرکت‌کنندگان بتوانند در محیط‌های شبیه‌سازی شده و با استفاده از تجهیزات و نرم‌افزارهای روز دنیا، مهارت‌های خود را به کار بگیرند. این تجربه عملی باعث می‌شود تا یادگیری نه تنها به صورت نظری بلکه به صورت ملموس و کاربردی انجام شود و دانش‌پذیران آماده مواجهه با چالش‌های واقعی در محیط‌های کاری شوند.

علاوه بر این، دوره MCSA 2025 نقش مهمی در توسعه توانایی حل مسئله و تفکر تحلیلی دارد. دانش‌پذیران یاد می‌گیرند چگونه مشکلات سیستم‌ها را شناسایی کنند، روش‌های مختلف مدیریت منابع را بسنجند و بهترین راهکارها را برای بهبود عملکرد انتخاب کنند. این مهارت‌ها نه تنها برای فعالیت در حوزه فناوری اطلاعات ارزشمند هستند، بلکه در ایجاد اعتماد به نفس و توانایی تصمیم‌گیری در شرایط مختلف نیز تأثیرگذارند.

این دوره برای افرادی که به دنبال رشد حرفه‌ای هستند، مسیر یادگیری مناسبی فراهم می‌کند. دانش‌پذیران پس از گذراندن دوره، قادر خواهند بود سیستم‌های مایکروسافت را با کارایی و امنیت بالا مدیریت کنند و در پروژه‌های مختلف سازمانی حضور مؤثر داشته باشند. علاوه بر مهارت‌های فنی، این دوره به افراد کمک می‌کند تا دید وسیع‌تری نسبت به روندهای فناوری اطلاعات پیدا کنند و درک بهتری از نیازهای بازار کار داشته باشند.

در کنار آموزش مهارت‌های فنی، این دوره بر توسعه مهارت‌های نرم و حرفه‌ای نیز تأکید دارد. دانش‌پذیران یاد می‌گیرند چگونه به صورت تیمی فعالیت کنند، وظایف خود را سازماندهی کنند و با دیگر متخصصان حوزه فناوری اطلاعات همکاری داشته باشند. این توانایی‌ها نقش مهمی در موفقیت شغلی دارند و باعث می‌شوند افراد پس از پایان دوره، نه تنها دانش فنی بلکه مهارت‌های کاربردی برای ورود به بازار کار را نیز داشته باشند.

با گذراندن دوره MCSA PACK 2025، دانش‌پذیران مدرکی معتبر و قابل ترجمه دریافت می‌کنند که می‌تواند در ارتقاء شغلی و حتی مهاجرت‌های کاری به عنوان یک امتیاز مهم محسوب شود. این مدرک نشان‌دهنده تسلط فرد بر مفاهیم و مهارت‌های کلیدی سیستم‌عامل‌های مایکروسافت است و به عنوان یک برگ برنده در مسیر حرفه‌ای و تحصیلی او عمل می‌کند.

در نهایت، دوره MCSA 2025 فرصتی است برای کسانی که می‌خواهند به صورت جدی وارد دنیای فناوری اطلاعات شوند و مهارت‌های عملی و کاربردی را بیاموزند. این دوره نه تنها دانش و مهارت ارائه می‌دهد، بلکه الهام‌بخش افراد برای ادامه مسیر یادگیری و پیشرفت در حوزه فناوری اطلاعات است. هر دانش‌پذیر پس از این دوره با اعتماد به نفس و آمادگی کامل می‌تواند در محیط‌های حرفه‌ای فعالیت کند و به عنوان متخصص سیستم‌های مایکروسافت شناخته شود.
سر فصل‌ها

Introduction

• Overview of networking
• Overview of workgroup
• Overview of domain
• Overview of client
• Overview of server

Protocols and ports

• Overview of Protocols and ports
• Overview of Protocol types
• Overview of SSH
• Overview of DNS
• Overview of SMTP
• Overview of FTP
• Overview of TFTP
• Overview of TELNET
• Overview of SSH
• Overview of DHCP
• Overview of HTTP
• Overview of HTTPS
• Overview of SNMP
• Overview of RDP
• Overview of NTP
• Overview of SIP
• Overview of SMB
• Overview of POP3
• Overview of IMAP4
• Overview of ICMP
• Overview of UDP
• Overview of TCP
• Overview of IP
• Overview of Connection-oriented vs. connectionless
• Overview of port number classification

Devices, Applications, Protocols, and Services at Each OSI Layers

• Overview of OSI model
• Overview of Layer 7
• Overview of Layer 6
• Overview of Layer 5
• Overview of Layer 4
• Overview of Layer 3
• Overview of Layer 2
• Overview of Layer 1

Devices, Applications, Protocols, and Services at Each TCP/IP Layers

• Overview of TCP/IP model
• Overview of Layer 1
• Overview of Layer 2
• Overview of Layer 3
• Overview of Layer 4 / 5

Concepts and Characteristics of Routing and Switching

• Overview of network traffic
• Overview of Broadcast domains
• Overview of CSMA/CD
• Overview of CSMA/CA
• Overview of Protocol data units
• Overview of MTU
• Overview of Broadcast
• Overview of Multicast
• Overview of Unicast
• Overview of Segmentation and interface properties
• Overview of ARP table
• Overview of Routing
• Overview of Routing protocols
• Overview of Distance-vector routing protocols
• Overview of Link-state routing protocols
• Overview of Routing types
• Overview of Static
• Overview of Dynamic
• Overview of QoS
• Overview of NAT/PAT

Internet Protocol Addressing

• Overview of NIC
• Overview of MAC address
• Overview of Private vs. public
• Overview of Loopback and Apipa
• Overview of Default gateway
• Overview of Subnet mask
• Overview of Subnetting
• Overview of Supernetting
• Overview of Classes A, B, C, D, and E
• Overview of CIDR
• Overview of Address assignments
• Overview of DHCP
• Overview of APIPA
• Overview of Loopback

Network Topologies

• Overview of Wired Topologies
• Overview of Logical vs. Physical
• Overview of Star
• Overview of Mesh
• Overview of Bus
• Overview of Tree
• Overview of Hybrid
• Overview of Ring
• Overview of LAN
• Overview of WLAN
• Overview of MAN
• Overview of WAN
• Overview of CAN
• Overview of SAN
• Overview of PAN

Wireless Technologies and Configurations

• Overview of Wireless Topologies
• Overview of Ad hoc
• Overview of Infrastructure
• Overview of 802.11 standards:
o 802.11a
o 802.11b
o 802.11g
o 802.11n
o 802.11ac
o 802.11ax
o 802.11be
• Overview of Radio Frequencies:
o 2.4 GHz
o 5.0 GHz
• Overview of Speed and distance requirements
• Overview of Channel bandwidth
• Overview of Unidirectional/omnidirectional
• Overview of Wireless Security

Cabling

• Overview of Media types
• Overview of Copper
• Overview of UTP
• Overview of STP
• Overview of Coaxial
• Overview of Fiber
• Overview of Single-mode
• Overview of Multimode
• Connector types
• Overview of Copper
• Overview of RJ-45
• Overview of RJ-11
• Overview of BNC
• Overview of F-type
• Overview of Fiber
• Overview of LC
• Overview of ST
• Overview of SC
• Overview of MTRJ
• Overview of Transceivers
• Overview of SFP
• Overview of SFP+
• Overview of QSFP
• Overview of Characteristics of fiber transceivers
• Overview of Half Duplex
• Overview of Full Duplex
• Overview of Single mode
• Overview of Multiple mode
• Overview of Patch panel
• Overview of Copper cable standards
• Overview of Cat 3
• Overview of Cat 5
• Overview of Cat 5e
• Overview of Cat 6
• Overview of Cat 6a
• Overview of Cat 7
• Overview of RG-6
• Overview of RG-59
• Overview of Copper termination standards
• Overview of TIA/EIA 568a
• Overview of TIA/EIA 568b
• Overview of Crossover
• Overview of Straight-through
• Overview of Ethernet deployment standards
• Overview of 100BASE-T
• Overview of 1000BASE-T
• Overview of 1000BASE-LX
• Overview of 1000BASE-SX
• Overview of 10GBASE-T

Appropriate placement of Networking devices on a network

• Firewall
• Router
• Switch
• Hub
• Bridge
• Wireless access point
Networking Attacks
• Overview of DoS
• Overview of DDoS
• Overview of Social engineering
• Overview of Rogue access point
• Overview of Phishing
• Overview of Ransomware
• Overview of Brute force
• Overview of Man-in-the-middle
• Overview of Exploits and vulnerabilities
Configuration and Commands
• Configuring and managing NIC by GUI
• Configuring and managing NIC by Command
• Configuring Networking between devices
• ping
• ipconfig
• ARP
• getmac
• nslookup
• pathping
• tracert
• Optional: Overview and installing cisco packet tracer
• Optional: Capturing frames
• Optional: Overview of Ethernet frame
• Optional: Basic configuration of Router (CLI)
• Optional: Basic configuration of Switch (CLI)
• Optional: Overview of Dynamic Routing
• Optional: Overview of Static Routing
• Optional: Overview of Autonomous System, EGP and BGP
• Optional: Configuring Static Route

Virtualization

• Overview of Virtualization
• Installing VMWare Workstation
• Configuring and Managing VMWare Workstation
• Creating Virtual Machines
• Configuring Virtual Machines
• Managing Virtual Machines
• Configuring VMWare Workstation Storage
• Configuring VMWare Workstation Networking
• Advance Settings of VMWare Workstation

Installing Windows 11

• Overview of Windows 11 and Workgroup
• Navigating the User Interface
• Comparing Different Versions and Architectures
• Overview of Different Types of Installation
• Overview of Sysprep and OOBE
• Using Sysprep to Change SID
• Installing Windows 11
• Basic Configuration
• Upgrading to Windows 11

• ***Optional: Using Hiren and Reseting Password

Users, Groups and Profile

• Overview of User and Built in Groups
• Common Configuration Options
• Managing User Accounts
• Managing Groups
• Managing Users and Groups by Commands
• Creating Mass User Creation
• Overview of Different Types of Profile
• Managing Local Profile

Network Connectivity

• Overview of Networking
• Configuring IP Network Connectivity
• Configuring Networking and Virtual Switch

Storage

• Overview of Different Types of Storage
• Overview of Different Types of File System
• Overview of Different Types of RAIDS
• Managing Disks
• Overview of MBR and GPT
• Creating Basic Partitions, Primaty, Extended and Logical
• Creating Dynamic Volumes, Simple, Spanned, Striped and Mirror
• Creating Virtual Hard Disks
• Managing Partitions and Volumes
• Managing Disks, Partitions and Volumes by Command
• File Systems and Allocation Unit Size
• Creating and Managing Storage Spaces and Pools
• Overview of Redundancy in Storage Spaces
• Managing 1 Way and 2 Way Mirror
• Managing RAID 5
• Advance Settings of Storage
• Creating Bootable USB by CMD
• Creating Bootable USB by Rufus
• Managing BIOS Partitions
• Managing UEFI Partitions

Managing Files and Printers

• Overview of File and Printers
• Configuring and Managing Printers
• Configuring and Managing File Access
• Configuring and Managing Shared Folders
• Configuring and Managing Offline File
• Configuring and Managing Map Networtk Drive
• Overview of Administrative Shares
• Creating Hidden Share
• Disabling Administrative Shares by Registry

Implementing Group Policy

• Overview of Local Group Policy
• Managing Local Group Policy
• Configuring and Managing Password Policies
• Configuring and Managing Account Lockout Policies
• Configuring and Managing Audit Policies
• Configuring and Managing User Right Assignments
• Configuring and Managing Security Options
• Configuring and Managing Application Control Policies
• Configuring and Managing Administrative templates Sub Policies

BIOS

• Overview of Power on Self-Test
• Overview of UEFI
• Overview of Legacy Traditional

Security

• Overview of Data-Related Security Threats and Access Control List (ACL)
• Overview of Device Security
• Overview of Using Security Settings to Mitigate Threats
• Overview of User Account Control
• Overview of NTFS Permissions, Inheritance, Default Permissions
• Managing NTFS Permissions
• Managing Share Permissions
• Overview of Encryption File System (EFS)
• Securing Data with EFS
• Creating Recovey Agent Key for EFS
• Implementing and Managing BitLocker
• Managing User Account Control
• Overview of Network-Related Security Threats
• Configuring and Managing Windows Firewall
• Configuring and Managing Connection Security Rules
• Configuring and Managing Windows Defender

Troubleshooting and Recovery

• Overview of Devices and Drivers
• System Image Backup
• Recovering Files and Images
• Restore Point
• File History
• Previous Version Tab
• ***Optional: Overview of Veeam

Maintaining Windows 11

• Overview of Maintenance
• Updating Windows
• Monitoring Windows 11
• Optimizing Performance
• Performance Monitor
• Resource Monitor

Remote Desktop

• Overview of Remote Desktop
• Configuring and Managing Remote Desktop
• Configuring and Managing Remote Desktop Assistance
• Advance Settings of Remote Desktop
• Overview of Team Viewr and Anydesk
• Changing RDP Port by Registry
• ***Optional: Overview of VDI

Virtualization

• Overview of Virtualization
• Installing VMWare Workstation
• Configuring and Managing VMWare Workstation
• Creating Virtual Machines
• Configuring Virtual Machines
• Managing Virtual Machines
• Configuring and Managing VMWare Workstation Storage
• Configuring VMWare Workstation Networking
• Advance Settings VMWare Workstation

Installing, Upgrading, and Migrating servers and workloads

• Introducing Windows Server
• Preparing for Upgrades
• Upgrading Windows Server
• Managing Windows Server
• Overview of Windows Server Dashboard
• Overview of Roles and Features

Active Directory

• Overview of Domain
• Installing Active Directory Domain Services
• Creating and Configuring Forest and Domain Controller
• Overview of Active Directory Users and Computers
• Managing Active Directory Container
• Implementing and Managing OUs in Active Directory
• Creating and Managing User Accounts in Active Directory
• Creating and Managing Groups in Active Directory
• Managing Computer Accounts in Active Directory
• Managing Users by User Template
• Configuring and Managing Additional Domain Controllers
• Overview of Install from Media
• Configuring Additional Domain Controllers by IFM
• Configuring and Managing Read-Only Domain Controllers
• Configuring Pre-Stage or Pre-Created Read-Only Domain Controllers
• Performing Bulk Active Directory Operations
• Demoting DC and Removing Metadata
• Joining Computers to Domain by Using GUI
• Joining Computers to Domain by Using PowerShell and CMD
• Using Offline Join
• Introducing PowerShell in Active Directory
• Configuring and Managing Active Directory by CMD
• Configuring and Managing Active Directory by PowerShell
• Advance Settings of Active Directory
• Troubleshooting Active Directory Installations
• Overview of Kerberos
• Overview of NTLM
• Overview of LDAP
• Overview of Mass User Creation
• Creating Multiple Users by CSVDE and LDIFDE
• Redirect Users and Computers to a Specific OU

Account and Profile

• Overview of Account Tab
• Overview of Profile Tab
• Overview of Local Profile, Roaming Profile, Mandatory Profile
• Configuring and Managing Roaming Profile

Group Policy

• Overview of Domain Group Policy
• Overview of Group Policy Storage, Linking, Hierarchy
• Creating and configuring GPOs
• Administering GPOs
• Managing Group Policy Tabs, Inheritance, Starter GPO, Copy GPO
• Configuring and Managing WMI Filtering and Queries
• Configuring and Managing Password Policy and Lockout Policy by GPO
• Configuring and Managing Password Setting Object (PSO) by GPO
• Configuring and Managing Kerberos and Audit Policy by GPO
• Configuring and Managing User Right Assignment and Delegation by GPO
• Configuring and Managing Security Options by GPO
• Configuring and Managing Restricted Group, System by GPO Service
• Configuring and Managing Firewall by GPO Service
• Configuring and Managing App Locker by GPO Service
• Configuring and Managing Software Installation by GPO Service
• Overview of Policies for Group Policy
• Configuring and Managing Loopback Processing, Replace and Merge
• Implementing Administrative Templates
• Configuring and Managing Group Policy Preferences
• Planning Group Policy
• Configuring and Managing Group Policy Modeling
• Configuring and Managing Group Policy Results
• Backup and Restore GPOs

Backup and Recovery

• Overview of Backup and Restore in Windows server
• Overview of Active Directory Backup and Restore in Windows server
• Creating Active Directory Full and System State Backup
• Using Authoritative and Non-Authoritative Recovery
• Creating, Managing and Restoring Active Directory Snapshot
• Managing and Restoring Recycle Bin in Active Directory
• Using Tombstone for Recovery
• Overview of Incremental and Decremental Backup
• ***Optional: Overview of Veeam

Monitoring

• Overview of Windows Server 2025 Monitoring Tools
• Using Performance Monitor
• Monitoring Event Logs
• Establishing a Performance Baseline

Dynamic Access Control (DAC) and NIC Teaming

• Overview of Dynamic Access Control
• Configuring and Managing DAC
• Overview of NIC Teaming
• Overview of Teaming Modes
• Overview of load Balancing
• Configuring and Managing NIC Teaming

Internet Information Services (IIS)

• Overview of Internet Information Services (IIS)
• Creating and Managing FTP and Web Site in IIS

Dynamic Host Configuration Protocol (DHCP)

• Overview of the DHCP Role Service
• Planning a DHCP Server Implementation
• Installing and Configuring DHCP Server
• Validating the DHCP Server Implementation
• Creating and Managing Scopes and Options
• Creating and Managing Super Scope
• Creating and Managing Multicast Scope
• Creating and Managing Split Scope
• Creating and Managing Failover by Built in DHCP Failover
• Creating and Managing DHCP Policies
• Managing DHCP by Commands
• Overview of DHCP and BOOTP
• Overview of Time 1 and Time 2
• Overview of Lease Duration
• Monitoring DHCP
• Advance Settings of DHCP

Domain Name Service (DNS)

• Overview of NetBIOS Name
• Overview of Fully Qualify Domain Name
• Overview of DNS and WINS Servers
• Planning DNS Name Resolution
• Implementing DNS servers
• Overview of Standard and Active Directory Integrated Zones
• Overview of Forward Look up Zone
• Overview of Revers Lookup Zone
• Configuring and Managing Primary Zone
• Creating and Managing Secondary Zone
• Creating and Managing Stub Zone
• Overview of Records
• Managing A, AAAA, CNAME, PTR, MX and SRV Records
• Managing DNS Zone Tabs
• Managing DNS Server Tabs
• Managing Advanced DNS Settings
• Configuring and Managing Scopes
• Overview of Recursive and Iterative
• Configuring and Managing Caching Only DNS Server
• Configuring and Managing Root DNS Server
• Configuring and Managing DNS Delegation
• Configuring and Managing DNS Policies
• Configuring and Managing Global Name Zone
• Configuring and Managing Forwarder and Conditional Forwarder
• Configuring and Managing Advance Round Robin by PowerShell and Policies
• Overview of DNS Threats and Mitigations
• Securing DNS Server
• Troubleshooting DNS
• Advance Settings of Domain Name Service

Internet Protocol Address Management (IPAM)

• Overview of IPAM
• Deploying IPAM
• Installing and Configuring IPAM Server
• Managing IP Address Spaces and Blocks by Using IPAM
• Managing DHCP Servers by Using IPAM
• Managing DNS Servers by Using IPAM
• Advance Settings of Internet Protocol Address Management

Routing and Remote Access Server (RRAS)

• Overview of Routing and Remote Access in Windows Server
• Overview of Network Address Translation (NAT)
• Implementing NAT
• Configuring and Managing Server as a Router
• Overview of Virtual Private Network (VPN)
• Configuring and Managing VPN Remote Access
• Configuring and Managing DHCP Relay Agent

File Server Resource Manager (FSRM)

• Overview of Disk Quota
• Configuring and Managing Disk Quota
• Overview of File Server Resource Manager (FSRM)
• Configuring and Managing Folder Quota
• Configuring and Managing a File screening to a Volume or Folder
• Configuring and Managing Storage Reports Management
• Managing Quota and File Screening Templates
• Advance Settings of File Server Resource Manager

Distributed File System (DFS) and DFS-Replication

• Overview of Distributed File System (DFS)
• Configuring and Managing DFS Namespaces
• Overview of Distributed File System Replication
• Configuring and Managing DFS Replication
• Managing DFS Replication Groups
• Configuring Advance Tabs of DFS

Server Core

• Overview of Server Core
• Installing Server Core
• Managing Server Core
• Configuring Server Core
• Using CMD and PowerShell to Configure Server Core
• Using Remote Access to Configure Server Core
• Installing Active Directory on a Server Core
• Configuring and Managing Server Core as a Domain Controller
• Configuring and Managing Server Core as an Additional Domain Controller
• Configuring and Managing Server Core as a Read Only Domain Controller

IPSec

• Overview of Man in the Middle Attack
• Overview of IPSec
• Overview of Microsoft Network Monitor and Wireshark
• Securing FTP connection by Using IPSec

Service Account

• Overview of Service Account
• Managing Service Accounts
• Creating and Managing Standalone Managed Service Account (sMSA)
• Creating and Managing Group Managed Service Account (gMSA)
• Creating and Managing Virtual Group Service Account

IPv4 and IPv6

• Overview of IPv4 and IPv6
• Overview IPv6
• Subnetting
• Superneting
IPSec
• Overview of IPv4
• Overview of IPv6
• Subnetting
• uperneting

Active Directory Domain and Trust (ADDT)

• Overview of Root Tree Domains and Child Domains
• Configuring and Managing Child Domain Controllers
• Configuring and Managing Root Tree Domain Controllers in the Same Forest
• Overview of Forest, External, Realm, Parent-Child, Root Tree Domain and Shortcut Trusts
• Configuring and Managing Forest, External, Realm, and Shortcut Trusts
• Configuring and Managing Forest-Wide Authentication and Selective authorization
• Configuring and Managing SID Filtering
• Configuring and Managing Name Suffix Routing
• Advance Settings of Active Directory Domain and Trust

Active Directory Site and service (ADSS)

• Overview of Active Directory Domain Controllers Replication
• Configuring and Managing Active Directory Sites
• Configuring and Managing Active Directory Subnets
• Configuring and Managing Site Links
• Overview of Knowledge Consistency Checker (KCC)
• Configuring and Managing Replication Topology
• Overview of Active Directory Partitions
• Configuring and Managing ADDS Intra-Site Replication
• Creating and Managing Site Link Bridges
• Manage Registration of SRV Records
• Managing Replication by Command
• Monitoring and Troubleshooting ADDS Replication
• Advance Settings of Active Directory Site and service

Active Directory Certificate Service (ADCS)

• Overview of Encryption
• Overview of Symmetric and Asymmetric Encryption
• Overview of Certificate and Digital Signature
• Overview of ADCS Role Service
• Choosing between a standalone and an enterprise CA
• Choosing between a root and a subordinate CA
• Overview of different role Service of ADCS
• Installing and Configuring Certificate Authority
• Configuring and Managing Online/Offline Root and Subordinate CAs
• Configuring and Managing Certificate Templates
• Enrolling Certificate Manually
• Auto Enrolling Certificate by GPO
• Installing and Configuring CA Web Enrollment Role Service
• Enrolling Certificate by using CA Web Enrollment
• Exporting and Importing Certificates
• Using Internal CA for Publishing a HTTPS Web Site
• Configuring and Managing Revocation
• Troubleshooting and Maintaining CAs

Active Directory Rights Management Services (ADRMS)

• Overview of ADRMS
• Installing ADRMS
• Configuring and Managing ADRMS
• Configuring and Managing Rights Policy Templates
• Configuring and Managing Exclusion Policies
• Configuring and Managing Security Policies
• ADRMS Backup and Restore
• Configuring Client Side to Use ADRMS
• Using ADRMS on Clients to Protect Data
• Advance Settings of Active Directory Rights Management Services

Advance Active Directory Configuration

• Overview of Active Directory Defragmentation
• Configuring Offline Active Directory Defragmentation
• Changing Directory Restore Mode Password
• Changing Source of Windows server Roles and Feature
• Changing Tombstone Lifetime
• Managing Default Workstation Number a User Can Join to the domain
• Renaming Domain Name

Storage and Share

• Overview of SMB and NFS
• Configuring and Managing Share Folders
• Planning Storage Requirements
• Configuring and Managing iSCSI Target Server
• Overview of Storage Replication
• Configuring and Managing Storage Replication
• Overview of Data Deduplication
• Configuring and Managing Data Deduplication

Failover Clustering

• Overview of Failover Cluster
• Planning a Failover Cluster
• Configuring and Managing Failover Cluster
• Configuring and Managing Cluster Networking
• Configuring and Managing Cluster Storage
• Configuring and optimizing Clustered Shared Volumes (CSVs)
• Configuring and Managing Quorum
• Configuring and Managing Disk and File Share Witness
• Configuring and Managing Failover Cluster for DHCP
• Configuring and Managing Failover Cluster for File Server
• Verifying High Availability
• Maintaining and Troubleshooting Failover Cluster
• Advance Settings of Failover Cluster

Network Load Balancing (NLB)

• Overview of NLB
• Configuring NLB Cluster
• Planning NLB Implementation
• Configuring and Managing the NLB Cluster
• Managing Affinity
• Managing Unicast, Multicast and IGMP
• Managing Cluster Operation Modes
• Managing Cluster Filtering Modes
• Validating High Availability for NLB Cluster

Flexible Single Master Operations (FSMO) and Functional Levels

• Overview of Flexible Single Master Operations
• Managing Domain Naming and Schema Operation Master Roles
• Managing RID, PDC and Infrastructure Operation Master Roles
• Transferring Operation Master Roles (GUI)
• Transferring Operation Master Roles (Command)
• Seizing Operation Master Roles
• Overview of Domain and Forest Functional Level
• Managing Domain Functional Level
• Managing Forest Functional Level

Nested Groups

• Overview of Active Directory Nested Groups
• Managing Universal, Global and Local Groups
• Managing Security and Distribution Groups

Print Server

• Overview of Windows printer deployments
• Overview of Printer Permissions
• Configuring and Managing Printer
• Overview of Spooling and Advance Tab Options
• Configuring and Managing Shared Printer and Deployment Types
• Overview of Printer Pooling
• Configuring Printer Pooling

***Optional Extra

• Overview of Unified Threat Management (UTM)
• Configuring and Managing Kerio Control (UTM)
• Practical Scenario: Publishing Website by Using Public IP Address, Domain Name and Kerio UTM on the Internet
• Practical Scenario: Publishing FTP Site by Using Public IP Address, Domain Name and Kerio UTM on the Internet
• Practical Scenario: Remote Desktop by Using Public IP Address, Domain Name and Kerio UTM on the Internet
• Practical Scenario: VPN Remote Access (Routing and Remote Access Server) by Using Public IP Address, Domain Name and Kerio UTM on the Internet
• Overview of Windows Deployment Service (WDS)
• Configuring and Managing WDS
• Overview of Windows Server Update Services (WSUS)
• Configuring and Managing WSUS

{{#ifUser}}{YouCommented}{{else}}{AddCommentAccess}{{/ifUser}}