MCSE 70-293 Planning and Maintaining a Server 2003 Network

advertisement
CCNP ISCW
www.itttc.net
‫ﺑﺮﻧﺎﻣﻪ آﻣﻮزﺷﻲ ﭘﻴﺸﻨﻬﺎدي‬
A+ 220-601
Network+ 2009
(N10-004)
CCNA 640-802
(R & S)
MCSA
MCSE
MCSE
Security
70-270
70-290
70-291
Security+
70-293
70-294
70-298
MCITP
Server
Administrator
MCITP
Enterprise
Administrator
70-640
70-642
70-646
70-620
70-640
70-642
70-643
70-647
MCITP
Database
Administrator
70-350
70-431
70-443
70-444
MCITP
Enterprise
Messaging
Administrator
CCNP
4 Classes
ITTTC
Cisco VoIP
640-460
CCNA
Security
640-553
CCNA Voice
CCVP
5 Classes
CCSP
5 Classes
70-236
70-237
70-238
www.itttc.net
ITTTC
CWNA
640-721
CCNA
Wireless
BSCI (642-901)
ONT (642-845)
ISCW (642-825)
BCMSN (642-812)
www.itttc.net
CompTIA
A+ Essentials
Network+ 2007
Security+ 2007
www.itttc.net
www.itttc.net
CompTIA 220-601
A+ Essentials
Chapter-1 Personal Computer Components
Chapter-6 Security
1.1
PC Components Part I
6.1
Security Part I
1.2
PC Components Part II
6.2
Security Part II
1.3
PC Components Part III
6.3
Install & Configure & Upgrade and Optimize Security
1.4
Install, Configure & Optimize PC Components Part I
6.4
Preventative Maintenance for Computer Security
1.5
Install, Configure & Optimize PC Components Part II
1.6
Identify Tools and Diagnostics for PC Components Part I
1.7
Identify Tools and Diagnostics for PC Components Part II
1.8
Performing Preventive Maintenance on PCs
Chapter-7 Safety and Environmental Issues
7.1
Perform Preventative Maintenance for Computer
Security
Chapter-2 Laptops and Portable Devices
7.2
Hazards & Safety Procedures
7.3
Identify Disposal Procedures
2.1
Principals of Laptops and Desktop Devices
2.2
Upgrade and Optimize Laptops and Portable Devices
2.3
Identify Tools and Diagnostic Procedures
2.4
Preventative Maintenance for Laptops and Portable
8.1
Use Good Communication Skills
Devices
8.2
Use Appropriate Job-Related Behavior
Chapter-8 Professionalism and Communication
Chapter-3 Operating Systems
Appendix-A New Technologies
3.1
Operating Systems Fundamentals
Animations
3.2
Installing and Configuring Operating Systems
3.3
Troubleshooting Operating Systems Part I
A1
Public Key Encryption
3.4
Troubleshooting Operating Systems Part II
A2
IP Addressing & Classes
3.5
Preventative Operating System Maintenance
A3
Wireless LANs
A4
Fiber Optic Cabling
Chapter-4 Printers and Scanners
A5
Disk Mirroring, Duplexing & Stripping
4.1
Printer Technologies
Wireless Technologies
4.2
Scanners and Communication Types
4.3
Installing & configuring & upgrading printers and scanners
A6
Wireless Networking Organizations
4.4
Troubleshooting Printers and Scanners
A7
WiMax Overview
A8
802.11n Overview
A9
D-Link WLAN Products
A10
Linksys WLAN Products
A11
WLAN Security Protocols
Chapter-5 Networks
5.1
Networking Fundamentals Part I
5.2
Networking Fundamentals Part II
5.3
Install & configure & optimize and upgrade networks
5.4
Troubleshooting Networks
www.itttc.net
Appendix-B Networking Topics
Windows Vista Ultimate Lessons & Labs
B1
Internetworking Overview
Lab 3.1
Windows Vista Overview
B2
OSI Model
Lab 3.2
Getting Around Windows Vista
B3
Ethernet Networks
Lab 3.3
Installing Windows Vista Ultimate Edition
B4
Ethernet Cabling
Lab 3.4
Taskbar, Start Menu, Activation, Recycle Bin
B5
Network Domains
Lab 3.5
Taskbar & Start Menu & Control Panel Overview
B6
Ethernet Addressing
Lab 3.6
Control Panel & Disk Cleanup
B7
Cisco Routers
Lab 3.7
Customizing Start Menu, Searching & Windows
Gadgets
Lab 3.8
Event Viewer
Windows XP Labs
A+ 220-601 Utilities CDs
Lab 1.1
Installing Windows XP SP2
Lab 1.2
System Properties
x
Ebooks
Lab 1.3
Printing
x
A+ 220-601 Exam
Lab 1.4
Authentication
Display & Device Properties
x
A+ Videos
Lab 1.5
Accessibility
x
VMWare Workstation Software
Lab 1.6
Lab 1.7
Screen Effects
x
VMWare Workstation Software Training in Farsi
Lab 1.8
Display Resolution
Lab 1.9
Device Manager & Add Hardware Wizard
Lab 1.10 Hardware Profiles
Lab 1.11 Power Options
Lab 1.12 TCP/IP Addressing & IPCONFIG
Lab 1.13 Backup & Restore
Lab 1.14 System Restore & Safe Mode
Lab 1.15 Performance Options & Task Manager
Windows Server 2003 Labs
Lab 2.1
Installing Server 2003 Enterprise Edition
Lab 2.2
MMC & Computer Management Console
Lab 2.3
Disk Defragmenter
Lab 2.4
Printing
Lab 2.5
Compression & Encryption
Lab 2.6
Automated System Recovery
Lab 2.7
Device Manager, Hardware & Resources
Lab 2.8
Automatic Updates
www.itttc.net
CompTIA Network+ 2007
Chapter-1
Introduction to Networking
Chapter-7 Survey of Network Operating Systems
1.1 What is a Network?
7.1 Network Operating Systems
1.2 Network Configuration Overview
7.2 UNIX
1.3 Network Components
7.3 Novel Netware Integration
Chapter-2 Network Communications & OSI Layers
Chapter-8 Wide Area Networking
2.1 Network Communications & OSI Layers
8.1 Switching Methods
8.2 Cell Switching
8.3 Using the Digital Telephone with ISDN
Chapter-3 Introduction to Server 2003 & TCP/IP
8.4 DSL
3.1 The Five Flavors of Server 2003
8.5 Cable Modem
3.2 Windows 2003 Networking Models
8.6 Using Fiber Optics with FDDI
3.3 Installation Types
8.7 Frame Relay
3.4 Network Addressing & TCP/IP
8.8 T-Carrier System
3.5 TCP/IP Addressing
8.9 SONET
3.6 TCP/IP Troubleshooting Tools
3.7 TCP/IP Subnetting
Chapter-9 Network Services & Support
3.8 Network Traffic
3.9 Introduction to NAT
9.1 Name Resolution
3.10 Other TCP/IP Protocols
9.2 DHCP
9.3 WINS
9.4 DNS
Chapter-4 Network Communication & Network
9.5 IP Configuration in Microsoft Windows
Connectivity Devices
9.6 Network Troubleshooting
4.1 Data Communication & Signals
4.2 Modems
Chapter-10 Networking with Remote Clients & Servers &
4.3 Expanding a Network Using Components
Network Security
Chapter-5 IEEE Standards, Physical Media, Wireless
Technologies & Network Layout Design
10.1 Remote Node
10.2 Terminal Server
10.3 IPSec
5.1 IEEE Standards
10.4 VPN
5.2 Physical Media
10.5 Trust Relationships
5.3 Wireless Technologies
10.6 Firewalls
5.4 Network Layout Design
Chapter-11 Network Configuration
Chapter-6 Networking Architectures
11.1 VLAN
6.1 Networking Architectures (Ethernet)
11.2 Disaster Recovery
6.2 Token Ring Architecture
11.3 SOHO
6.3 AppleTalk & ArcNet
www.itttc.net
Chapter-12 IPv6 Overview & Cisco 3-Layer Hierarchy
Chapter-18 WAN Overview, Frame Relay & ISDN
12.1 IPv6 Overview
18.1 WAN Overview
12.2 Cisco 3-Layer Hierarchy
18.2 Introduction to Frame Relay
12.3 Fast Switching vs. Process Switching
18.3 ISDN Overview
18.4 ISDN Types
18.5 ISDN Functional Groups and Reference Points
Cisco CCNA & Wireless LAN Topics
18.6 ISDN Standards
Chapter-13 Introduction to Cisco Internetworking
18.7 ISDN & Cisco Routers
13.1 Internetworking
Chapter-19 Introduction to Wireless LANs
13.2 OSI Model
13.3 Ethernet Networks
19.1 History of Wireless LANs
13.4 Ethernet Cabling
19.2 Today's Wireless LAN Standards
13.5 Network Domains
19.3 Applications of Wireless LANs
13.6 Ethernet Addressing
19.4 Wireless Networking Standards
13.7 Cisco 3-Layer Hierarchical Model
19.5 Radio Frequency Spectrum
13.8 Ethernet Framing
19.6 FHSS vs. DSSS
Chapter-14 IP Addressing, Subnetting, VLSM & NAT
Windows XP Service Pack 2 Lessons
14.1 IP Addressing Overview
1. Hardware Requirements
14.2 Subnetting Overview
2. Simple File Sharing
14.3 VLSM Overview
3. User and Group Accounts
14.4 Network Address Translation
4. Configuring and Managing User Profiles
5. Hardware
6. Disk Storage
Chapter-15 Static vs. Dynamic Routing & RIP
7. Configuring and Troubleshooting TCP/IP Part I
8. Windows XP Backup
15.1 Distance Vector vs. Link State Routing
15.2 RIP
Windows Server 2003 Enterprise Lessons
Chapter-16 Ethernet, Switch Function & Switch Types
1. Windows Server 2003 Networking Models
16.1 Ethernet Overview
2. Disk Types
16.2 Switch vs. Bridge
3. Using Saved Queries
16.3 Switch Function
4. Server 2003 Printing Terminology
16.4 Switch Function Example #1
5. Authentication
16.5 LAN Switch Types
6. Backup & Restore
7. Group Policy
Chapter-17 Introduction to STP & VLANs
8. Device Manager
17.1 Spanning Tree Protocols
17.2 Introduction to VLANs
www.itttc.net
Windows Vista Lessons
Networking Animations
1. Windows Vista Overview
A1
Backbone & Segments
2. Getting Around Windows Vista
A2
Bridges vs. Switches
3. Automated Help & Support
A3
Physical Topologies
4. Customizing the Desktop & Interface
A4
LANs, MANs & WANs
5. Installing and Maintaining Programs
A5
Wireless LANs
6. Understanding User & Group Accounts
A6
Fiber Optic Cabling
7. Windows Mobility Center
A7
Network Cables
8. Configuring User and Computer Policies
A8
Mirror Volume
A9
Public Key Encryption
A10
IP Spoofing
A11
Proxy Server
Introduction ISA Server 2004 Lessons
x
ISA Server Capabilities & Operation
A12
DMZ (Demiliterized Zone)
x
ISA Server 2004 vs. other Firewall Products
A13
Access Control Lists
x
ISA Server 2004 Lab
A14
PPTT/VPN Servers
A15
IP Address Classes
A16
Making a Patch Cable (Steps)
A17
RJ-45, AUI, Patch Panel & CAT-5
A18
Cisco Three Layer Hierarchy & Cisco Products
A19
OSI Model
A20
OSI Layers
A21
Checking Router Cabling
A22
Cisco Routers
A23
TCP/IP Windowing
A24
Layer-2 Switch Functionality
A25
Layer-2 Switch Responsibilities
Introduction to Cisco VoIP Lessons
x
Telephony Networks, Components & PSTN
x
PBX vs. Key Systems
x
VoIP Network Components & Advantages
Cisco CCNA Router & Switch Labs
CCNA-Lab-1 Basic Router Configuration
CCNA-Lab-2 Routing in Two Subnets
Packet Tracer Labs
CCNA-Lab-3 Routing in Four Subnets
CCNA-Lab-4 PC to PC Comm. using Cisco 2950 Switch
CCNA-Lab-5 Configuring Cisco Discovery Protocol
CCNA-Lab-6 LAN Switching using Two Cisco 2950 Switches
P1
PC to PC Communication
P2
Single Device: Hub
P3
Single Device: Switch
P4
Single Device: Router
P5
Multiple Devices: Multiple Hubs
P6
Multiple Devices: Multiple Switches
P7
Multiple Devices: Multiple Routers
P8
Mixed Environement (Hubs, Switches, Routers)
www.itttc.net
Windows XP Labs
Network+ 2007 Utilities CD
XP-1
Installing Windows XP SP2
x
E-books
XP-2
System Properties
x
Packet Tracer
XP-3
Printing
Authentication
x
NetSIM
XP-4
Display & Device Properties
x
Subnet
XP-5
XP-6
Accessibility
x
Wildcard Calculator
XP-7
Screen Effects
x
Network+ Exam
XP-8
Display Resolution
x
VMWare Workstation Software
XP-9
Device Manager & Add Hardware Wizard
x
VMWare Workstation Software Training in Farsi
XP-10 Hardware Profiles
Windows Server 2003 Enterprise Labs
Server-1
Installing Server 2003
Server-2
APIA & IPCONFIG
Server-3
Loopback Test & PING
Server-4
Administrative Tools
Server-5
Event Viewer
Server-6
Service Console
Server-7
System Properties
Server-8
Network Connection Types
Windows Vista Ultimate Labs
Vista-1 Installing Windows Vista Ultimate Edition
Vista-2 Taskbar & Start Menu
Vista-3
Password Reset Disk
Vista-4
System Startup and Recovery & System
Configuration
Vista-5
Taskbar & Start Menu & Control Panel
Vista-6
Control Panel & Disk Cleanup
Vista-7
Device Manager & Performance Options
Vista-8
Local Area Connection Properties & TCP/IP
Configuration
www.itttc.net
CompTIA Security+
Chapter 1 General Networking and Security Concepts
Chapter 6 Application Security
1.1 The Big Picture
6.1 E-mail Security
1.2 Identifying Threats
6.2 Web Security
1.3 Intrusion Points
6.3 File Transfer
1.4 Defending against Threats
1.5 Organizational and Operational Security
Chapter 7 User Security
Chapter 2 TCP/IP Basics
7.1 Understanding Authentication
7.2 Understanding Access Control Models
2.1 TCP/IP Layers and Vulnerabilities
Chapter 8 Security Baselines
Chapter 3 Certificate Basics
8.1 Network Device and Operating System Hardening
2.1 Understanding & Using Cryptography
8.2 Server Application Hardening
2.2 Types of Protected Integrity
2.3 Identifying the components of a Public Key Infrastructure
Chapter 9 Operational Security
2.4 Certificate Authorities
2.5 Understanding Certificate Life Cycle and Key
9.1 Physical Security
Management
9.2 Privilege Management
2.6 Supplement #1 & Summary
9.3 Removable Media
9.4 Protecting Business Continuity
Chapter 4 Network Infrastructure Security
Chapter 10 Organizational Security
4.1 Securing Network Cabling
4.2 Securing Connectivity Devices
10.1 Documentation
4.3 Firewalls
10.2 Risk Assessment
4.4 Remote Access
10.3 Security Education
4.5 Telecommunications Hacking
4.6 Wireless Network
Chapter 11 Incident Detection and Response
4.7 NAT
4.8 VLAN
11.1 Attacks and Malicious Code
4.9 Protecting Mobil Devices
11.2 Intrusion Detection Systems
4.10 Implementing IDS & using Honeypots and Honeynets
11.3 Incident Response
Chapter 5 Communications Security
5.1 Understanding Remote Access Connectivity
5.2 Providing Secure Remote Access
5.3 Understanding Wireless Standards and Protocols
www.itttc.net
Appendix-A Security Topics & Security Tools
Cisco Security Topics Parts I, II, III
x
Robocopy.exe: Robust File Copy Utility
x
Rpcdump.exe: RPC Dump
x
Sc.exe: Service Controller Tool
x
Sclist.exe
x
Setspn.exe: Manipulate Service Principal Names for
x
Cisco Router Passwords
x
Standard IP ACLs
x
Extended IP ACLs
x
Showacls.exe
x
Switch CAM Table
x
Showpriv.exe: Show Privilege
x
Static MAC Address
x
Shutdown.exe: Remote Shutdown
x
Port Security for 1900/2500 series switches
x
Srvany.exe: Applications as Services Utility
x
Cisco Discovery Protocol
x
Srvcheck.exe
x
CDP Commands
x
Srvinfo.exe
x
Su.exe
x
Subinacl.exe
x
Uptime.exe
x
Vadump.exe: Virtual Address Dump
x
Whoami.exe
x
Xcacls.exe
Accounts
Server 2003 Security Topics
x
Server 2003 Security Settings Lab
Server 2003 Resource Kit Security Tools (37 Tools)
x
Auditpol.exe: Audit Policy
x
Clearmem.exe: Clear Memory
x
Drivers.exe: List Loaded Drivers
x
Nessus
x
Dsstore.exe: Directory Services Store
x
Ethereal
x
Dumpel.exe: Dump Event Log
x
Snort
x
Efsinfo.exe: Encrypting File System Information
x
Netcat
x
Findgrp.exe: Find Group
x
TCPDump/WinDump
x
Getmac.exe: GetMAC
x
Hping2
x
Getsid.exe
x
DSniff
x
Gettype.exe: Get Type Version Information
x
GFI LANguard
x
Ipsecpol.exe: Internet Protocol Security Policies Tool
x
Ettercap
x
Kerbtray.exe: Kerberos Tray
x
Whisker/LibWhisker
x
Klist.exe: Kerberos List
x
John the Ripper
x
Logoff.exe
x
OpenSSH / SSH
x
Ntrights.exe
x
Sam Spade
x
Pulist.exe
x
ISS Internet Scanner
x
Regback.exe: Registry Backup
x
Tripwire
x
Regdmp.exe
x
Nikto
x
Regfind.exe
x
Kismet
x
Regini.exe: Registry Change by Script
x
SuperScan
x
Regrest.exe: Registry Restoration
x
L0phtCrack 4
x
Retina
Internet Top 75 Security Tools
www.itttc.net
x
Netfilter
x
Authentication Protocols
x
Fport
x
Encryption
x
SAINT
x
Windows Firewall
x
Network Stumbler
x
Security Under SP2
x
SARA
x
N-Stealth
x
AirSnort
x
NBTScan
x
Security Framework
x
GnuPG /PGP
x
Segmenting Networks
x
Firewalk
x
Encryption Authentication
x
Cain & Abel
x
PKI
x
XProbe2
x
Auditing
x
SolarWinds Toolsets
x
IPSec
x
NGrep
x
Securing IIS Web Sites
x
Perl / Python
x
RRAS IAS
x
THC-Amap
x
Securing Wireless Networks
x
OpenSSL
x
NTop
x
Nemesis
x
LSOF
x
Honeyd
x
Achilles
x
Brutus
x
Stunnel
x
User & Security Groups
x
Paketoo Keiretsu
x
Local Logon
x
Fragroute
x
Stored Passwords
x
Spike Proxy
x
Managing Local User Accounts and Groups
x
THC-Hydra
x
Managing Remote Access to Workstations
x
File Security and Resource Sharing
x
Basic/Special Permissions
x
File Ownership/ Inheritance
ISA Server 2004 Overview
Appendix-C Server 2003 Security Topics
ISA Server Lab
x
ISA Server 2004 Overview Lab
Appendix-D:
Windows Vista Ultimate Security Topics
x
ISA Server 2004 Capabilities
x
Effective Permissions
x
ISA Server 2004 Operation
x
Sharing Files & Folders over the Network
x
Public Folder Sharing
x
Vista Networking Features
x
TCP/IP and Dual IP Stack
Appendix-B Windows XP SP2 Security Topics
x
Authentication
x
Diagnosing and Resolving Problems
x
Security
x
Optimizing and Safeguarding Disk Drives
x
Data Compression
x
Windows Security Center Windows Firewall
x
Data Encryption
x
Windows Defender
x
Configuring & Troubleshooting TCP/IP
x
Automatic Updates
x
Task Manager
x
Reliability and Performance Monitor
www.itttc.net
11 Categories of Shareware Security Tools
Security+ Utilities CD
x
Crytp
x
E-books
x
Email Antispam
x
Freeware Security Tools
x
File Encryption
x
Windows Security Tools
x
File Wiping
x
VMWare Workstation Software
x
IP Address Tools
x
VMWare Workstation Software Training in Farsi
x
Network Info Tools
x
Security+ Exam
x
Network Monitoring
x
Networking Tools
x
Other Tools
x
Password Dictionaries
x
Personal Firewalls
Appendix-E WLAN Security Topics
x
WLAN Security
x
WEP (Wired Equivalent Privacy)
x
Solutions to WEP Weaknesses
x
AES (Advanced Encryption Standard)
x
Filtering
x
Attacks on Wireless LANs
x
Emerging Security Solutions
x
Corporate Security Policy
x
Security Recommendations
www.itttc.net
Microsoft
MCSA
MCSE
MCSE Security
www.itttc.net
www.itttc.net
MCSA / MCSE 70-270
Windows XP Professional SP2
Chapter-1 Installing and Deploying Windows XP
Professional
4.6
Multiple Language Support & Regional Options
4.7
Files Settings and Transfer Wizard
4.8
Accessibility Options
4.9
Advanced Video Display Options
4.10
Fax Features & Scheduled Tasks
1.1
Hardware Requirements
1.2
Upgrading to Windows XP Professional
1.3
Installation Options for Windows XP Professional
1.4
Joining a Workgroup or Domain
1.5
Using USMT and FAST Wizard
1.6
Deploying Service Packs
1.7
Automatic and Dynamic Updates
1.8
Product Activation
5.1
Hardware
1.9
Troubleshooting Failed Installation
5.2
Device Drivers, Drive Signing & using Devices
5.3
Wireless Networking Support
5.4
Video Display
5.5
Removable Storage Support
5.6
Upgrading a System from One to Two Processors
Chapter-5 Installing, Configuring, and
Troubleshooting Hardware Devices and
Drivers
Chapter-2 Establishing, Configuring, and Managing
Resources
2.1
Simple File Sharing
5.7
Mobile Computing
2.2
Shared Folders
5.8
Managing Hardware Profiles
2.3
Access to Files and Folders
5.9
Power Management Support
2.4
Managing and Troubleshooting Web Server Resources
5.10
Managing Card Services
2.5
Printing Concepts
Chapter-6 Implementing, Managing, and
Chapter-3 Setting Up, Managing, and
Troubleshooting Disk Storage
Troubleshooting Security Accounts and
Policies
6.1
Disk Storage
6.2
Partitions vs. Volumes
3.1
User and Group Accounts
6.3
File Systems & Disk Quotas
3.2
Authentication
6.4
Data Compression & Encryption
3.3
Managing Domain User Accounts
3.4
GPO and RSoP
3.5
Security
Chapter-7 Implementing, Managing, and
Troubleshooting Network Protocols and
Services
Chapter-4 Implementing and Managing User and
Desktop Settings
7.1
Configuring and Troubleshooting TCP/IP Part I
7.2
Configuring and Troubleshooting TCP/IP Part II
4.1
Configuring and Managing User Profiles
7.3
Novel Netware & UNIX Connectivity
4.2
Using Offline Files
7.4
Network Bridging
4.3
Configuring & Troubleshooting Desktop Settings
7.5
Windows Messenger
4.4
Troubleshooting and System Settings
7.6
Remote Desktop & Remote Assistance
4.5
Windows Installer Service
www.itttc.net
Chapter-8 System Monitoring, Performance
Chapter-3 Labs
Optimization, and Recovery Features
Lab 3.1 User and Group Accounts
8.1
Windows XP Backup
Lab 3.2 Authentication
8.2
Volume Shadow Copy Technology
Lab 3.3 Managing Domain User Accounts
8.3
Troubleshooting and Repairing Windows XP
Lab 3.4 GPO and RSoP
Professional Systems
Lab 3.5 Security
8.4
Measuring and Managing Performance
8.5
Task Manager & Monitoring Event Logs
Chapter-4 Labs
Lab 4.1 Configuring and Managing User Profiles
Chapter-9 Installing, Administering, and
Troubleshooting Remote Access Services
Lab 4.2 Using Offline Files
Lab 4.3 Configuring & Troubleshooting Desktop Settings
9.1
Authentication Protocols
Lab 4.6 Multiple Language Support & Regional Options
9.2
Encryption
Lab 4.7 Files Settings and Transfer Wizard
9.3
Connecting to Remote Access Servers
Lab 4.8 Accessibility Options
9.4
Configuring Windows Firewall
Lab 4.9 Advanced Video Display Options
9.5
Configuring and Troubleshooting ICS
9.6
Security Under SP2
Chapter-5 Labs
Lab 5.1 Hardware
Lab 5.2 Device Drivers, Drive Signing & using Devices
Windows XP Professional SP2 Labs
Lab 5.3 Wireless Networking Support
Lab 5.4 Video Display
Chapter-1 Labs
Lab 5.8 Managing Hardware Profiles
Lab 1.3 Installation Options for Windows XP Professional
Lab 5.9 Power Management Support
Lab 1.4 Joining a Workgroup or Domain
Lab 1.5 Using USMT and FAST Wizard
Chapter-6 Labs
Lab 1.7 Automatic and Dynamic Updates
Lab 6.1 Disk Storage
Chapter-2 Labs
Lab 6.2 Partitions vs. Volumes
Lab 6.3 File Systems & Disk Quotas
Lab 2.1 Simple File Sharing
Lab 6.4 Data Compression & Encryption
Lab 2.2 Shared Folders
Lab 2.3 Access to Files and Folders
Chapter-7 Labs
Lab 2.4 Managing and Troubleshooting Web Server
Resources
Lab 2.5 Printing Concepts
Lab 7.2 Configuring and Troubleshooting TCP/IP Part II
Lab 7.5 Windows Messenger
Lab 7.6 Remote Desktop & Remote Assistance
www.itttc.net
Chapter-8 Labs
70-270 Additional Features
x
E-book
Lab 8.1 Windows XP Backup
x
70-270 Exam
Lab 8.2 Volume Shadow Copy Technology
x
Tool: USMT 3.0
Lab 8.3 Troubleshooting and Repairing Windows XP
Professional Systems
Lab 8.4 Measuring and Managing Performance
ITTTC Utilities CD
Lab 8.5 Task Manager & Monitoring Event Logs
x
Windows Vista Ultimate Lessons and Lab
x
VMWare Workstation Software
x
VMWare Workstation Software Training in Farsi
Lab 9.1 Authentication Protocols
x
Windows XP Service Pack 3 Information
Lab 9.2 Encryption
x
Windows XP Animations
Chapter-9 Labs
Lab 9.3 Connecting to Remote Access Servers
Lab 9.4 Configuring Windows Firewall
Lab 9.5 Configuring and Troubleshooting ICS
Lab 9.6 Security Under SP2
www.itttc.net
www.itttc.net
MCSA / MCSE 70-290
Server 2003 Environment Management and Maintenance
Chapter-1 Introduction to Windows Server 2003 &
4.9 Managing printing from the command line
Active Directory
Chapter-5 Windows 2003 Security
1.1
Windows 2003 Networking Models
5.1 Authentication
1.2
Installation Types
5.2 Cryptography
1.3
What is a Directory? Active Directory
5.3 Encrypting File System (EFS)
1.4
MMC
5.4 Security Configuration Tools
1.5
Administrating User Accounts
5.5 Auditing in Server 2003
1.6
Server 2003 Groups
1.7
User Profiles
1.8
Account Policies
Chapter-6 Backup and Restore & Managing Data
Storage
Chapter-2 Server 2003 File System, Disks Shared
Folders, NTFS Permissions
6.1 Backup & Restore
6.2 ASR
6.3 Shadow Copies of Shared Folders
2.1 Disk Types
6.4 NTFS Compression
2.2 Windows 2003 File Systems
6.5 Disk Quota
2.3 Using NTFS Mounted Drives
2.4 Shared Folders
Chapter-7 Group Policy
2.5 NTFS Permissions
2.6 NTFS Partitions
7.1 What is Group Policy?
2.7 Disk Defragmenter
7.2 SW Deployment Methods using Group Policy
2.8 Disk Management Commands
7.3 RSoP (Resultant Set of Policy)
7.4 Group Policy Management Console (GPMC)
Chapter-3 Active Directory Part II
Chapter-8 Devices, Drivers, Automatic Updates &
3.1 Saved Queries
Software Update Service
3.2 Active Directory Command Line Tools
3.3 Operations Master Roles
8.1 Device Manager
8.2 Driver Signing
Chapter-4 Setting up and Configuring Printers in
Server 2003
4.1 Server 2003 Printing Terminology
8.3 System Update Features
8.4 Software Update Services
Chapter-9 Administrative Tools Remote Desktop &
4.2 Network Printing Requirements
System Monitor Performance Logs & Alerts
4.3 Guidelines for Network Printing
4.4 Adding other types of printers
4.5 Internet Printing
4.6 Configuring Network Printers
4.7 Print Spooler
9.1 Server 2003 Tools
9.2 Remote Connections
9.3 System Monitor & Performance Logs & Alerts
9.4 Tuning System Performance
4.8 Printer Administration
www.itttc.net
Chapter-10 Domains/Forests Functional Levels &
Chapter-3 Labs
IIS 6.0
Lab 3.1 Saved Queries
10.1 Domain & Forest Functional Levels
Lab 3.2 Active Directory Command Line Tools
10.2 IIS 6.0
Lab 3.3 Operations Master Roles
10.3 FTP
Chapter-4 Labs
Chapter-11 Terminal Services
Lab 4.4 Adding other types of printers
11.1 Terminal Services Overview
Lab 4.5 Internet Printing
11.2 Terminal Services Benefits
Lab 4.6 Configuring Network Printers
11.3 Using Terminal Server to host applications centrally
Lab 4.7 Print Spooler
11.4 Terminal Services Administrative Tools
Lab 4.8 Printer Administration
11.5 Managing TS from the Command Line
Lab 4.9 Managing printing from the command line
11.6 TS Client Overview
11.7 TS Client Features
Chapter-5 Labs
11.8 TS Licensing Overview
11.9 TS Licensing Modes
Lab 5.1 Authentication
11.10 TS Troubleshooting
Lab 5.2 Cryptography
Lab 5.3 Encrypting File System (EFS)
70-290 Server 2003 Environment Labs
Lab 5.4 Security Configuration Tools
Lab 5.5 Auditing in Server 2003
Chapter-1 Labs
Chapter-6 Labs
Lab 1.1 Windows 2003 Networking Models
Lab 1.2 Installation Types
Lab 6.1 Backup & Restore
Lab 1.3 What is a Directory? Active Directory
Lab 6.2 ASR
Lab 1.4 MMC
Lab 6.3 Shadow Copies of Shared Folders
Lab 1.5 Administrating User Accounts
Lab 6.4 NTFS Compression
Lab 1.6 Server 2003 Groups
Lab 6.5 Disk Quota
Lab 1.7 User Profiles
Lab 1.8 Account Policies
Chapter-7 Labs
Chapter-2 Labs
Lab 7.1 What is Group Policy?
Lab 7.2 SW Deployment Methods using Group Policy
Lab 2.1 Disk Types
Lab 2.3 Using NTFS Mounted Drives
Lab 7.3 RSoP (Resultant Set of Policy)
Lab 7.4 Group Policy Management Console (GPMC)
Lab 2.4 Shared Folders
Lab 2.5 NTFS Permissions
Lab 2.7 Disk Defragmenter
Lab 2.8 Disk Management Commands
www.itttc.net
Chapter-8 Labs
70-290 Additional Features
x
E-book
Lab 8.1 Device Manager
x
70-290 Exam
Lab 8.2 Driver Signing
x
Tools
Lab 8.3 System Update Features
Lab 8.4 Software Update Services
ITTTC Utilities CD
Chapter-9 Labs
Lab 9.1 Server 2003 Tools
Lab 9.2 Remote Connections
Lab 9.3 System Monitor & Performance Logs & Alerts
Lab 9.4 Tuning System Performance
x
Windows Vista Ultimate Lessons and Lab
x
VMWare Workstation Software
x
VMWare Workstation Software Training in Farsi
x
Windows XP Service Pack 3 Information
x
Windows XP Animations
Chapter-10 Labs
Lab 10.1 Domain & Forest Functional Levels
Lab 10.2 IIS 6.0
Lab 10.3 FTP
Chapter-11 Labs
Lab 11.3 Using Terminal Server to host applications centrally
Lab 11.4 Terminal Services Administrative Tools
Lab 11.5 Managing TS from the Command Line
Lab 11.7 TS Client Features
Lab 11.9 TS Licensing Modes
www.itttc.net
www.itttc.net
MCSA / MCSE 70-291
Server 2003 Network Infrastructure I
Chapter-1 Understanding Server 2003 Networks
Chapter-7 Configuring DHCP Servers & Clients
1.1 Understanding Network Infrastructures
7.1 Introducing DHCP
1.2 Networking with Default Components in Server 2003
7.2 DHCP Terminology
1.3 Extending a Server 2003 Network Infrastructure
7.3 DHCP Options
7.4 DHCP Database
Chapter-2
Understanding TCP/IP
7.5 Configuring DHCP Relay
7.6 Managing DHCP
2.1 Understanding TCP/IP
7.7 Managing DHCP Database
2.2 Understanding IP Addressing
7.8 DHCP Option Classes
2.3 Subnetting & Supernetting IP Networks
7.9 Configuring DHCP Servers to Perform DNS Updates
2.4 Installing & Configuring TCP/IP
Chapter-8 Monitoring & Troubleshooting DHCP
Chapter-3 Monitoring & Troubleshooting TCP/IP
Connections
8.1 DHCP Messages
8.2 Monitoring DHCP Through Audit Logging
3.1 Analyzing Traffic using Network Monitor
8.3 DHCP Performance Monitoring
3.2 Troubleshooting TCP/IP Connections
8.4 Troubleshooting DHCP
Chapter-4 Configuring DNS Servers & Clients
Chapter-9 Routing with Server 2003
4.1 Understanding Name Resolution in Server 2003
9.1
Configuring Windows Server 2003 for LAN Routing
4.2 Understanding DNS in Server 2003 Networks
9.2
Configuring RRAS
4.3 Deploying DNS Servers
9.3
Configuring Demand-Dial Routing
4.4 Deploying DNS Clients
9.4
Example of Configuring Demand-Dial Routing
9.5
NETSH Commands for RAS
9.6
Configuring NAT Part 1
9.7
Configuring NAT Part 2
5.1 Configuring DNS Server Properties
9.8
Internet Connection Sharing
5.2 Configuring Zone Properties & Transfers
9.9
Configuring and Managing Routing Protocols
5.3 Configuring Advanced DNS Server Properties
9.10 RIP for IP Security
5.4 Creating Zone Delegations
9.11 Configuring RIP for IP Router
5.5 Deploying Stub Zones
9.12 OSPF
Chapter-5 Implementing a DNS Infrastructure
9.13 Configuring Packet Filters
Chapter-6 Monitoring & Troubleshooting DNS
Chapter-10 Configuring and Managing Remote Access
6.1 Using DNS Troubleshooting Tools
6.2 Using DNS Monitoring Tools
10.1 Configuring Remote Access Connections
10.2 Authorizing Remote Access Connections
10.3 Implementing VPNs
12.1 Introduction to IAS
www.itttc.net
10.4 Installing and Configuring the IAS
Chapter-4 Labs
10.5 Configuring RRAS and IAS
10.6 Configuring IAS
Lab 4.3 Deploying DNS Servers
Lab 4.4 Deploying DNS Clients
Chapter-11 Managing Network Security
Chapter-5 Labs
11.1
Introduction to Security Protocols & Security Templates
11.2
IPSec and Levels of Security
Lab 5.1 Configuring DNS Server Properties
11.3
IPSec Rules
Lab 5.2 Configuring Zone Properties & Transfers
11.4
Checking IPSec Functionality
Lab 5.3 Configuring Advanced DNS Server Properties
11.5
IPSec Security Protocols & Modes of Operation
Lab 5.4 Creating Zone Delegations
11.6
IPSec Components
Lab 5.5 Deploying Stub Zones
11.7
IPSec Phases of Operation
11.8
Description of IPSec Policy
11.9
IPSec Tools
11.10
Troubleshooting Network Protocol Security
Chapter-6 Labs
Lab 6.1 Using DNS Troubleshooting Tools
Lab 6.2 Using DNS Monitoring Tools
Chapter-12 Maintaining a Network Infrastructure
Chapter-7 Labs
12.2 Monitoring Network Performance
12.3 Troubleshooting Internet Connectivity
Lab 7.3 DHCP Options
12.4 Troubleshooting Server Services
Lab 7.4 DHCP Database
Lab 7.5 Configuring DHCP Relay
70-291 Server 2003 Network Infrastructure I Labs
Lab 7.6 Managing DHCP
Lab 7.7 Managing DHCP Database
Lab 7.8 DHCP Option Classes
Chapter-1 Labs
Lab 7.9 Configuring DHCP Servers to Perform DNS Updates
Lab 1.2 Networking with Default Components in Server 2003
Lab 1.3 Extending a Server 2003 Network Infrastructure
Chapter-8 Monitoring & Troubleshooting DHCP
Lab 8.2 Monitoring DHCP Through Audit Logging
Chapter-2 Labs
Lab 8.3 DHCP Performance Monitoring
Lab 8.4 Troubleshooting DHCP
Lab 2.3 Subnetting & Supernetting IP Networks
Lab 2.4 Installing & Configuring TCP/IP
Chapter-3 Labs
Lab 3.1 Analyzing Traffic using Network Monitor
Lab 3.2 Troubleshooting TCP/IP Connections
Chapter-9 Routing with Server 2003
Lab 9.2
Configuring RRAS
Lab 9.3
Configuring Demand-Dial Routing
Lab 9.5
NETSH Commands for RAS
Lab 9.7
Configuring NAT Part 2
Lab 9.8
Internet Connection Sharing
Lab 9.9
Configuring and Managing Routing Protocols
Lab 9.11 Configuring RIP for IP Router
Lab 9.13 Configuring Packet Filters
www.itttc.net
Chapter-10 Configuring and Managing Remote Access
Lab 10.1 Configuring Remote Access Connections
70-291 Additional Features
x
E-books & MOC
x
70-291 Exam
Lab 10.2 Authorizing Remote Access Connections
Lab 10.3 Implementing VPNs
Lab 10.6 Configuring RRAS and IAS
Lab 10.7 Configuring IAS
Chapter-11 Managing Network Security
Lab 11.1 Introduction to Security Protocols & Security
ITTTC Utilities CD
x
Windows Vista Ultimate Lessons and Lab
x
VMWare Workstation Software
x
VMWare Workstation Software Training in Farsi
x
Windows XP Service Pack 3 Information
x
Windows XP Animations
Templates
Lab 11.4 Checking IPSec Functionality
Lab 11.6 IPSec Components
Lab 11.9 IPSec Tools
Chapter-12 Maintaining a Network Infrastructure
Lab 12.1 Monitoring Network Performance
Lab 12.2 Troubleshooting Internet Connectivity
Lab 12.3 Troubleshooting Server Services
www.itttc.net
www.itttc.net
CompTIA Security+
Chapter 1 General Networking and Security Concepts
Chapter 6 Application Security
1.1 The Big Picture
6.1 E-mail Security
1.2 Identifying Threats
6.2 Web Security
1.3 Intrusion Points
6.3 File Transfer
1.4 Defending against Threats
1.5 Organizational and Operational Security
Chapter 7 User Security
Chapter 2 TCP/IP Basics
7.1 Understanding Authentication
7.2 Understanding Access Control Models
2.1 TCP/IP Layers and Vulnerabilities
Chapter 8 Security Baselines
Chapter 3 Certificate Basics
8.1 Network Device and Operating System Hardening
2.1 Understanding & Using Cryptography
8.2 Server Application Hardening
2.2 Types of Protected Integrity
2.3 Identifying the components of a Public Key Infrastructure
Chapter 9 Operational Security
2.4 Certificate Authorities
2.5 Understanding Certificate Life Cycle and Key
9.1 Physical Security
Management
9.2 Privilege Management
2.6 Supplement #1 & Summary
9.3 Removable Media
9.4 Protecting Business Continuity
Chapter 4 Network Infrastructure Security
Chapter 10 Organizational Security
4.1 Securing Network Cabling
4.2 Securing Connectivity Devices
10.1 Documentation
4.3 Firewalls
10.2 Risk Assessment
4.4 Remote Access
10.3 Security Education
4.5 Telecommunications Hacking
4.6 Wireless Network
Chapter 11 Incident Detection and Response
4.7 NAT
4.8 VLAN
11.1 Attacks and Malicious Code
4.9 Protecting Mobil Devices
11.2 Intrusion Detection Systems
4.10 Implementing IDS & using Honeypots and Honeynets
11.3 Incident Response
Chapter 5 Communications Security
5.1 Understanding Remote Access Connectivity
5.2 Providing Secure Remote Access
5.3 Understanding Wireless Standards and Protocols
www.itttc.net
Appendix-A Security Topics & Security Tools
Cisco Security Topics Parts I, II, III
x
Robocopy.exe: Robust File Copy Utility
x
Rpcdump.exe: RPC Dump
x
Sc.exe: Service Controller Tool
x
Sclist.exe
x
Setspn.exe: Manipulate Service Principal Names for
x
Cisco Router Passwords
x
Standard IP ACLs
x
Extended IP ACLs
x
Showacls.exe
x
Switch CAM Table
x
Showpriv.exe: Show Privilege
x
Static MAC Address
x
Shutdown.exe: Remote Shutdown
x
Port Security for 1900/2500 series switches
x
Srvany.exe: Applications as Services Utility
x
Cisco Discovery Protocol
x
Srvcheck.exe
x
CDP Commands
x
Srvinfo.exe
x
Su.exe
x
Subinacl.exe
x
Uptime.exe
x
Vadump.exe: Virtual Address Dump
x
Whoami.exe
x
Xcacls.exe
Accounts
Server 2003 Security Topics
x
Server 2003 Security Settings Lab
Server 2003 Resource Kit Security Tools (37 Tools)
x
Auditpol.exe: Audit Policy
x
Clearmem.exe: Clear Memory
x
Drivers.exe: List Loaded Drivers
x
Nessus
x
Dsstore.exe: Directory Services Store
x
Ethereal
x
Dumpel.exe: Dump Event Log
x
Snort
x
Efsinfo.exe: Encrypting File System Information
x
Netcat
x
Findgrp.exe: Find Group
x
TCPDump/WinDump
x
Getmac.exe: GetMAC
x
Hping2
x
Getsid.exe
x
DSniff
x
Gettype.exe: Get Type Version Information
x
GFI LANguard
x
Ipsecpol.exe: Internet Protocol Security Policies Tool
x
Ettercap
x
Kerbtray.exe: Kerberos Tray
x
Whisker/LibWhisker
x
Klist.exe: Kerberos List
x
John the Ripper
x
Logoff.exe
x
OpenSSH / SSH
x
Ntrights.exe
x
Sam Spade
x
Pulist.exe
x
ISS Internet Scanner
x
Regback.exe: Registry Backup
x
Tripwire
x
Regdmp.exe
x
Nikto
x
Regfind.exe
x
Kismet
x
Regini.exe: Registry Change by Script
x
SuperScan
x
Regrest.exe: Registry Restoration
x
L0phtCrack 4
x
Retina
Internet Top 75 Security Tools
www.itttc.net
x
Netfilter
x
Authentication Protocols
x
Fport
x
Encryption
x
SAINT
x
Windows Firewall
x
Network Stumbler
x
Security Under SP2
x
SARA
x
N-Stealth
x
AirSnort
x
NBTScan
x
Security Framework
x
GnuPG /PGP
x
Segmenting Networks
x
Firewalk
x
Encryption Authentication
x
Cain & Abel
x
PKI
x
XProbe2
x
Auditing
x
SolarWinds Toolsets
x
IPSec
x
NGrep
x
Securing IIS Web Sites
x
Perl / Python
x
RRAS IAS
x
THC-Amap
x
Securing Wireless Networks
x
OpenSSL
x
NTop
x
Nemesis
x
LSOF
x
Honeyd
x
Achilles
x
Brutus
x
Stunnel
x
User & Security Groups
x
Paketoo Keiretsu
x
Local Logon
x
Fragroute
x
Stored Passwords
x
Spike Proxy
x
Managing Local User Accounts and Groups
x
THC-Hydra
x
Managing Remote Access to Workstations
x
File Security and Resource Sharing
x
Basic/Special Permissions
x
File Ownership/ Inheritance
ISA Server 2004 Overview
Appendix-C Server 2003 Security Topics
ISA Server Lab
x
ISA Server 2004 Overview Lab
Appendix-D:
Windows Vista Ultimate Security Topics
x
ISA Server 2004 Capabilities
x
Effective Permissions
x
ISA Server 2004 Operation
x
Sharing Files & Folders over the Network
x
Public Folder Sharing
x
Vista Networking Features
x
TCP/IP and Dual IP Stack
Appendix-B Windows XP SP2 Security Topics
x
Authentication
x
Diagnosing and Resolving Problems
x
Security
x
Optimizing and Safeguarding Disk Drives
x
Data Compression
x
Windows Security Center Windows Firewall
x
Data Encryption
x
Windows Defender
x
Configuring & Troubleshooting TCP/IP
x
Automatic Updates
x
Task Manager
x
Reliability and Performance Monitor
www.itttc.net
11 Categories of Shareware Security Tools
Security+ Utilities CD
x
Crytp
x
E-books
x
Email Antispam
x
Freeware Security Tools
x
File Encryption
x
Windows Security Tools
x
File Wiping
x
VMWare Workstation Software
x
IP Address Tools
x
VMWare Workstation Software Training in Farsi
x
Network Info Tools
x
Security+ Exam
x
Network Monitoring
x
Networking Tools
x
Other Tools
x
Password Dictionaries
x
Personal Firewalls
Appendix-E WLAN Security Topics
x
WLAN Security
x
WEP (Wired Equivalent Privacy)
x
Solutions to WEP Weaknesses
x
AES (Advanced Encryption Standard)
x
Filtering
x
Attacks on Wireless LANs
x
Emerging Security Solutions
x
Corporate Security Policy
x
Security Recommendations
www.itttc.net
MCSE 70-293
Planning and Maintaining a Server 2003 Network Infrastructure II
Chapter-1 Planning and Implementing Server Roles
Chapter-5 Planning, Implementing, and Maintaining
and Server Security
Network Security and Infrastructure
1.1
OS Selection: Client & Server
5.1
Configuring Port and Protocol Security
1.2
Default Security Settings
5.2
IPSec Policy
1.3
Security Configuration & Security Templates
5.3
Remote Desktop and Remote Assistance
1.4
Configuring Server Role Based Security
5.4
Planning Security for Wireless Networks
5.5
Troubleshooting IPSec
5.6
Planning a Security Update Infrastructure
5.7
Configuring PKI that uses Certificate Services
5.8
Using Smart Card for Authentication
5.9
Configuring Certificate Services
Chapter-2 Planning, Implementing, and Maintaining
a Network Infrastructure
2.1
Network Topology, Infrastructure & Protocols
2.2
Planning the Physical Placement of Network
Resources
2.3
IP Addressing, IP Routing and IP Subnetting
2.4
Planning an Internet Connectivity Strategy
2.5
Understanding Bandwidth Requirements
2.6
Choosing an Internet Access Solution
2.7
Client Configuration and Name Resolution
2.8
Resolving LAN/WAN Problems
2.9
Planning Name Resolution (DNS & NetBIOS)
70-293 Labs
Chapter-1 Labs
Lab 1.2 Default Security Settings
Lab 1.4 Configuring Server Role Based Security
Chapter-2 Labs
Chapter-3 Planning, Implementing, and Maintaining
Lab 2.2 Planning the Physical Placement of Network
Routing and Remote Access
Resources
Lab 2.4 Planning an Internet Connectivity Strategy
3.1
Routing Protocols and Routing Topologies
3.2
Static and Dynamic Routing Protocols
3.3
IP Multicast Routing
3.4
Dial-in Tab Security
3.5
RAS Client Authentication
3.6
Remote Access Policies
Lab 2.5 Understanding Bandwidth Requirements
Lab 2.8 Resolving LAN/WAN Problems
Chapter-3 Labs
Lab 3.3 IP Multicast Routing
Lab 3.4 Dial-in Tab Security
Chapter-4 Planning, Implementing, and Maintaining
Server Availability
Lab 3.5 RAS Client Authentication
Lab 3.6 Remote Access Policies
4.1
Server Avaiility & High Avaiility
4.2
Network Load Balancing & Implementing NLB
4.3
Clustering Services & Implementing Clustering Service
Lab 4.2 Network Load Balancing & Implementing NLB
4.4
Backup & Recover Strategy
Lab 4.3 Clustering Services & Implementing Clustering Service
Chapter-4 Labs
www.itttc.net
Chapter-5 Labs
70-293 Server 2003 Review Labs
Lab 5.4 Planning Security for Wireless Networks
1. Configuring Windows Components
Lab 5.7 Configuring PKI that uses Certificate Services
2. Configuring TCP/IP Filtering and using NETSH
Lab 5.9 Configuring Certificate Services
3. Configuring DHCP Service
4. Configuring DNS Service
70-293 Scenarios
5. Configuring and Removing Active Directory
6. Configuring Group Policy and RSoP
Chapter-1 Scenarios
7. Configuring Network Connections
8. Configuring Routing and Remove Access Server
S1.1
OS Selection: Client & Server
9. Configuring Demand Dial Interface
S1.3
Security Configuration & Security Templates
10. Configuring RIP and OSPF Routing Protocols
11. Configuring RADIUS Client and Server
Chapter-2 Scenarios
12. Configuring Packet Filtering
13. Configuring IP Security
S2.1
Network Topology, Infrastructure & Protocols
S2.3
IP Addressing, IP Routing and IP Subnetting
S2.6
Choosing an Internet Access Solution
S2.7
Client Configuration and Name Resolution
x
E-books
S2.9
Planning Name Resolution (DNS & NetBIOS)
x
70-293 Exam
70-293 Additional Features
Chapter-3 Scenarios
S3.1
Routing Protocols and Routing Topologies
S3.2
Static and Dynamic Routing Protocols
Chapter-4 Scenarios
ITTTC Utilities CD
x
Windows Vista Ultimate Lessons and Lab
x
VMWare Workstation Software
x
VMWare Workstation Software Training in Farsi
S4.1
Server Availability & High Availability
x
Windows XP Service Pack 3 Information
S4.4
Backup & Recover Strategy
x
Windows XP Animations
Chapter-5 Scenarios
S5.1
Configuring Port and Protocol Security
S5.2
IPSec Policy
S5.3
Remote Desktop and Remote Assistance
www.itttc.net
MCSE 70-294
Planning, Implementing & Maintaining Server 2003 Active Directory
Chapter-1 Introduction to Active Directory
5.3
Configuring Intersite Replication
5.4
Configuring Global Catalog Servers
1.1
Introduction to Active Directory
5.5
Configuring Application Directory Partitions
1.2
Active Directory Logical and Physical Structures
5.6
Monitoring and Troubleshooting Replication
1.3
Active Directory Data Store
1.4
Trust Relationships
1.5
Group Policy Overview
1.6
Active Directory Object Naming
6. 1 Understanding OUs
1.7
AD Design Process
6. 2 Creating and Administering an OU Structure
1.8
ADsPaths
Chapter-6 Implementing OU Structure
Chapter-7 Administering User Accounts
Chapter-2 Installing & Configuring Active Directory
7.1 Understanding User Accounts
2.1 Preparing for Active Directory Installation
7.2 Creating User Accounts
2.2 Installing and Removing Active Directory
7.3 Managing User Profiles and Home Folders
2.3 Verifying Active Directory Installation
7.4 Maintaining User Accounts
2.4 Troubleshooting Active Directory Installation and Removal
Chapter-8 Administering Groups
Chapter-3 Administering Active Directory
8.1 Understanding Groups
3.1 Using Active Directory Administration Tools
8.2 Creating and Administering Groups & Administration
3.2 Domain & Forest Functional Levels
Strategies
3.3 UPN Suffixes
3.4 Backing up Active Directory
Chapter-9 Administering AD Objects
3.5 Restoring Active Directory
3.6 Miscellaneous
9.1 Locating AD Objects
9.2 Controlling Access to AD Objects
Chapter-4 Installing & Managing Domains, Trees & Forests
9.3 Delegating Administrative Control of AD Objects
4.1 Creating Multiple Domains, Trees, and Forests
Chapter-10 Implementing Group Policy
4.2 Renaming and Restructuring Domains and Renaming DCs
4.3 Managing Operations Master Roles
10.1 Understanding Group Policy
4.4 Managing Trust Relationships
10.2 Group Policy Planning Strategies
10.3 Implementing a GPO
Chapter-5 Configuring Sites & Managing Replication
Chapter-11 Administering Group Policy
5.1 Understanding Sites and Replication
5.2 Configuring Sites
11.1 Managing Group Policy with RSoP
11.2 Managing Special Folders with Group Policy
11.3 Troubleshooting Group Policy
www.itttc.net
Chapter-12 Deploying Software with Group Policy
Chapter-4 Labs
12.1 Understanding Software Deployment with Group Policy
4.1 Creating Multiple Domains, Trees, and Forests
12.2 Deploying Software with Group Policy
4.2 Renaming and Restructuring Domains and Renaming DCs
12.3 Maintaining Software Deployed with Group Policy
4.3 Managing Operations Master Roles
12.4 Troubleshooting Software Deployed with Group Policy
4.4 Managing Trust Relationships
Chapter-13 Administering Security with Group Policy
Chapter-5 Lab
13.1 Understanding AD Security
5.2
Configuring Sites
13.2 Implementing Software Restriction Policies
5.3
Configuring Intersite Replication
13.3 Implementing an Audit Policy & Administering the
5.4
Configuring Global Catalogs
5.6
Monitoring and Troubleshooting Replication
Security Log
13.4 Using Security Templates
13.5 Using Security Configuration And Analysis
Chapter-6 Lab
Chapter-14 Managing AD Performance
6. 2 Creating and Administering an OU Structure
14.1 Monitoring Performance with Service Logs and System
Chapter-7 Labs
Monitor
14.2 Monitoring Performance with Performance Logs And
Alerts
7.2 Creating User Accounts
7.3 Managing User Profiles and Home Folders
14.3 Optimizing and Troubleshooting AD Performance
Chapter-8 Labs
70-294 Active Directory Labs
8.2 Creating and Administering Groups & Administration
Strategies
Chapter-2 Labs
Chapter-9 Labs
2.2 Installing and Removing Active Directory
2.3 Verifying Active Directory Installation
2.4 Troubleshooting Active Directory Installation and Removal
9.1 Locating AD Objects
9.2 Controlling Access to AD Objects
Chapter-3 Labs
9.3 Delegating Administrative Control of AD Objects
3.1 Using Active Directory Administration Tools
Chapter-10 Labs
3.2 Backing Up Active Directory
3.3 Restoring Active Directory
10.1 Understanding Group Policy
3.4 Domain & Forest Functional Levels
10.2 Group Policy Planning Strategies
3.5 UPN Suffixes
10.3 Implementing a GPO
3.6 Backing up AD
www.itttc.net
70-294 Additional Features
Chapter-11 Labs
11.1 Managing Group Policy with RSoP
x
E-books
x
70-294 Exam
11.2 Managing Special Folders with Group Policy
11.3 Troubleshooting Group Policy
ITTTC Utilities CD
Chapter-12 Labs
12.2 Deploying Software with Group Policy
Chapter-13 Labs
x
Windows Vista Ultimate Lessons and Lab
x
VMWare Workstation Software
x
VMWare Workstation Software Training in Farsi
x
Windows XP Service Pack 3 Information
x
Windows XP Animations
13.2 Implementing Software Restriction Policies
13.3 Implementing an Audit Policy & Administering the
Security Log
13.4 Using Security Templates
13.5 Using Security Configuration And Analysis
Chapter-14 Labs
14.1 Monitoring Performance with Service Logs and System
Monitor
14.2 Monitoring Performance with Performance Logs And
Alerts
www.itttc.net
www.itttc.net
MCSE 70-298
Designing Security for Microsoft Windows Server 2003 Network
Chapter-1 General Network Security Framework
Chapter-6 Data Access Control Strategies
1.1
Security Policy
6.1
Windows Security Permissions
1.2
Segmenting Networks
6.2
Encrypting File System
1.3
Encryption
1.4
Authentication
1.5
Public Key Infrastructure
1.6
Audit
Server 2003 Security Labs
Lab-1
Preventing Automatic Installation of New
Hardware Drivers
Chapter-2 Security Infrastructure Technologies
Lab-2
Protecting Against Modified Device Drivers
Lab-3
Encrypting the SAM
2.1
Securing Infrastructure Server
Lab-4
Enabling SYN Flood Protection
2.2
Certificate Services
Lab-5
Disabling Router Discovery
2.3
Patch Management
Lab-6
Configuring a Recovery Agent
2.4
Remote Administration Tools
Lab-7
Changing Encryption Algorithms
2.5
Terminal Services
Lab-8
Configuring Time Synchronization Settings
2.6
Windows Trust Models
Lab-9
Configuring Service Parameters
Lab-10
Disabling LM Hash Storage
Lab-11
Requiring NTLM Authentication
Lab-12
Signing LDAP Communications
Chapter-3 Securing Network Communications
3.1
IP Security
Lab-13
Restricting Remote Access to the Registry
3.2
Securing IIS Web Sites
Lab-14
Disabling Internet Printing
3.3
Routing and Remote Access Service
Lab-15
Configuring HTTP Authentication
3.4
Internet Authentication Service
Lab-16
Configuring FTP Authentication
3.5
Securing Wireless Networks
Lab-17
Configuring Trusted Certification Authorities
Lab-18
Using Preshared Keys
Lab-19
Configuring Session Encryption
Lab-20
Requiring a Password for Connection
Chapter-4 Secure Active Directory Design
4.1
Secure Active Director Design
Lab-21
Allowing Silent Session Monitoring
4.2
Active Directory Delegation
Lab-22
Restricting Access to the CA
4.3
Group Design
Lab-23
Shutting Down Windows When Unable
to Log Events
Chapter-5 Client Hardening
5.1
GPO Application Order
5.2
Popularly Tested GPO Settings
5.3
Security Templates
5.4
Windows Firewall and Legacy Clients
Lab-24
Finding More Information about an Event
Lab-25
Disabling Windows Update
www.itttc.net
70-298 Additional Features
Case Studies
x
E-books, Checklists, Security Templates
1. OmniPresence
x
70-298 Exam
2. GeoTrek
x
Windows Security Resource Kit
3. VisionWorx
x
RK Tools for Server 2003
4. GlobeComm
5. DreamSuites
ITTTC Utilities CD
6. TeleSoft
7. CredTech
Review Labs
Lab-1
DNS
Lab-2
Group Policy
Lab-3
RADIUS Clients and Servers
Lab-4
Inbound and Outbound Filters
Lab-5
Security Settings
x
Windows Vista Ultimate Lessons and Lab
x
VMWare Workstation Software
x
VMWare Workstation Software Training in Farsi
x
Windows XP Service Pack 3 Information
x
Windows XP Animations
Microsoft Security Web Site
Appendix-A Windows Server 2003 RK Security
Tools (50 Tools)
www.itttc.net
MCSE 70-350
Microsoft Internet Security and Acceleration Server 2004/2006
Chapter 0 ISA Server 2004 ON-LINE HELP
Chapter 7 Configuring ISA Server Firewall Policy
0.1
ISA Server 2004 ON-LINE HELP
7.1
Configuring ISA Server Firewall Policy
0.2
ISA Server 2004 Web Site
7.2
System Policy
7.3
Overview of Firewall Policy
7.4
Access Rules
7.5
Web & Server Publishing
7.6
Troubleshooting FW Policy
Chapter 1
ISA Server 2004 Overview
1.1
ISA Server Capabilities & Operation
1.2
ISA Server 2004 Editions and System Requirements
1.3
ISA Server Tools and Remote Administration
1.4
ISA Server as a Firewall
1.5
Comparing ISA 2004 to Other Firewall Products
8.1
Multinetworking Overview
1.6
ISA Server Deployment Scenarios
8.2
Working with Network Templates
8.3
Networks & Network Sets & Network Rules
8.4
Web & Firewall Chaining
Chapter 8 Configuring Multinetworking
Chapter 2 Installing and Configuring ISA Server 2004
Standard
Chapter 9
2.1
Installing & Configuring ISA Server 2004 Std. Edition
2.2
Understanding Caching Concepts
ISA Server Security and Administration
9.1
Overview
9.2
Security Policy Administration
Chapter 3 ISA Server 2004 Clients
Chapter 10 Securing VPN Access
3.1
Overview of ISA Server 2004 Client Types
3.2
ISA Server 2004 Client Types
10.1
Securing VPN Access
3.3
Using Infrastructure Servers
10.2
Site to Site VPN Configuration
10.3
VPN Quarantine
Chapter 4 Upgrading from ISA Server 2000
Chapter 11
4.1
Upgrading ISA Server 2004
4.2
Troubleshooting ISA Server Upgrades
Configuring Arrays
11.0
Installing ISA Server 2004 Enterprise Edition
11.1
Configuring Arrays
Chapter 5 Monitoring and Reporting
11.2
Troubleshooting Array Configuration
5.1
Monitoring and Reporting
Chapter 12 Enterprise and Array Policies
5.2
Performance Monitor
Chapter 6 Configuring Toolbox Elements
6.1
Configuring Toolbox Elements
6.2
Network Objects
12.1
Using Enterprise and Array Policies
12.2
Enterprise Policy Administration
12.3
Array Policy Administration
www.itttc.net
Chapter 13 Enterprise Technologies
Lab #8
System Policy
Lab #9
Overview of Firewall Policy
13.1
Enterprise Technologies and ISA Server 2004
Lab #10
Access Rules
13.2
Network Load Balancing
Lab #11
Web & Server Publishing
Lab #12
Working with Network Templates
Lab #13
Networks & Network Sets & Network Rules
Lab #14
Web & Firewall Chaining
Lab #15
ISA Server Security and Administration Overview
Lab #16
Security Policy Administration
Lab #17
Securing VPN Access
Lab #18
Site to Site VPN Configuration
Lab #19
Installing ISA Server 2004 Enterprise Edition
Lab #20
Configuring Arrays
Lab #21
Enterprise Policy Administration
Lab #22
Enterprise Technologies and ISA Server 2004
Lab #23
Network Load Balancing
Lab #24
ISA Server 2006 System Requirements
Lab #25
ISA Server 2006 Editions Comparison
Lab #26
ISA Server 2006 New Features
Chapter 14 ISA Server and Exchange Server 2003
14.1
Configuring ISA Server with Exchange Server 2003
14.2
Remote Access for Exchange Clients
Chapter-15 ISA Server 2006 Enterprise Edition
15.1
ISA Server 2006 System Requirements
15.2
ISA Server 2006 Editions Comparison
15.3
ISA Server 2006 New Features
15.4
65 ISA Server 2006 Key Features
ISA Server Labs
Lab #1
ISA Server 2004 ON-LINE HELP
Lab #2
Installing & Configuring ISA Server 2004 Standard
70-350 Additional Information
Edition
x
E-book & MOC, Skillsoft
Lab #3
ISA Server 2004 Client Types
x
ISA Server 2004 Enterprise Edition SP2 Software
Lab #4
Monitoring and Reporting
x
Lab #5
Performance Monitor
Lab #6
Configuring Toolbox Elements
x
Windows Vista Ultimate Lessons and Lab
Lab #7
Network Objects
x
VMWare Workstation Software
x
VMWare Workstation Software Training in Farsi
x
Windows XP Service Pack 3 Information
x
Windows XP Animations
ITTTC Utilities CD
www.itttc.net
Microsoft
MCTS
MCITP
Server Administrator
Enterprise Administrator
Database Administrator
Enterprise Messaging Administrator
www.itttc.net
www.itttc.net
MCTS / MCITP 70-620
Installing and Configuring Windows Vista Ultimate
Chapter 1 Introduction to Windows Vista Administration
6.4
Local User Accounts and Groups
6.5
Remote Access
1.1 Windows Vista Overview
1.2
Vista Upgrade Considerations
1.3
Installing Windows Vista
1.4
Troubleshooting Installation Problems
1.5
Windows Vista Architectural Changes
1.6
Automating the Windows Vista Installation
Chapter-7 Managing Laptops and Traveling Users
7.1
Power Management Settings
7.2
Networking for Laptops
Chapter-8
Configuring User and Computer Policies
Chapter 2 Managing Windows Vista Systems
2.1
Getting Around Windows Vista
2.2
User Account Control and Elevation Prompts
2.3
Supporting Computers Running Windows Vista
2.4
System Support Tools
2.5
System Properties
Drivers
Automated Help And Support
3.2
Devices & Device Manger & Device Drivers
3.3
Managing & Customizing Hardware
3.4
Internet Time
Group Policy Essentials
8.2
Configuring Policies
8.3
Access & Connectivity Policies
8.4
Computer & User Scripts Policies
Chapter-9 Managing Disk Drives & File System
Chapter 3 Configuring Systems, Hardware Devices, and
3.1
8.1
9.1
Disk Drives & File Systems
9.2
Disk Performance
9.3
Working with Basic & Dynamic Disks
9.4
Using Basic & Dynamic Disks
9.5
Disks, Partitions & Volumes
9.6
Partitioning Disks
Chapter-10 Managing File Security & Resource Sharing
Chapter 4 Customizing the Desktop and the Interface
4.1
Desktop and the Interface Part 1
4.2
Desktop and the Interface Part 2
Chapter 5 Installing and Maintaining Programs
5.1
Installing and Maintaining Programs
5.2
Program Compatibility & Managing Programs
10.1
File Security & Resource Sharing
10.2
File & Folder NTFS Permissions
10.3
Sharing Files & Folders over the Network
10.4
Public Folder Sharing
Chapter-11 Explorer Options, Offline Lines & Disk Quotas
11.1
Configuring Advanced Explorer Options
11.2
Offline Files
11.3
Disk Quotas
Chapter 6 Managing User Access and Security
6.1
User and Group Accounts
6.2
Local Logon
6.3
Stored Passwords
www.itttc.net
Chapter-12 TCP/IP Networking
70-620 Windows Vista Ultimate Labs
12.1
Windows Vista Networking Features
Chapter-1 Labs
12.2
TCP/IP & Dual IP Stack
12.3
Local Area Connections
12.4
Resolving Local Area Connection Problems
12.5
IPv4 Addressing
Lab #1 Installing Windows Vista Ultimate
Lab #2 Task Bar & Start Menu Properties
Lab #3 Vista Applications, Desktop, Recycle Bin, UAC & Control
Panel Overview
Lab #4 CTL-ALT-DEL Options
Lab #5 Password Reset Disk
Lab #6 System Overview
Lab #7 System Configuration
Lab #8 BCDEDIT
Lab #9 Sysprep
Chapter-13 Mobile Networking & Remote Access
13.1
Mobile Networking & Remote Access
13.2
Creating Remote Access Connections
13.3
Configuring Connection Properties
13.4
Wireless Networking
Chapter-2 Labs
Chapter-14 Advanced Internet Options and Security
14.1
Internet Options and Security
14.2
Cookies & Other Internet Files
14.3
Security Zones
Chapter-15 Optimizing Windows Vista
15.1
15.2
15.3
15.4
15.5
15.6
Safeguarding Disk Drives
Windows Security Center
Windows Firewalls
Windows Defender
Automatic Updates
Reliability & Performance Monitor
Remote Assistance & Event Logs
Task Scheduling
Backing up & Recovering a Computer
Troubleshooting Startup & Shutdown
Task Bar
Control Panel
MMC, Snap-ins, Computer Management,
Windows Management Instrumentation (WMI)
UAC & Security Settings
UAC Settings
Disk Cleanup
File Signature Verification
System Properties
System Restore
Chapter-3 Labs
Chapter-16 Supporting & Troubleshooting Windows
Vista
16.1
16.2
16.3
16.4
Lab #1
Lab #2
Lab #3
Services
Lab #4
Lab #5
Lab #6
Lab #7
Lab #8
Lab #9
Lab #10
Lab #1
Lab #2
Lab #3
Lab #4
Lab #5
Lab #6
Lab #7
Lab #8
Lab #9
Lab #10
Lab #11
Lab #12
Lab #13
Lab #14
Lab #15
Lab #16
Lab #17
www.itttc.net
Problem Reports and Solutions
Windows Memory Diagnostics Tool
Vista Support Services
Troubleshooting and Diagnostics using GPO
Windows Update & Windows Ultimate Extras
Device Manager
Device Drivers
Using Signed and Unsigned Drivers using GPO
Driver Searching using GPO
Restricting Driver Installation using GPO
Keyboard Settings
Mouse Settings
Audio Driver
Regional Options & Settings
Windows Time Service
Configuring Internet Time for Workgroups
Configuring Internet Time for Domains
Chapter-4 Labs
Lab #8 Configuring Assigning Computer & User Scripts in GP
Lab #1 Personalization
Lab #2 Start Menu & Search
Lab #3 Vista Gadgets
Chapter-9 Labs
Chapter-5 Labs
Lab #1
Lab #2
Lab #3
Lab #4
Lab #5
Lab #6
Lab #7
Lab #8
Lab #9
Lab #10
Lab #11
Administrative Privilege
User Account Control & RunAS
UAC Security Options using GPO
Default Programs
Accessories
Turning Features ON or OFF
Windows Vista Contacts
Windows Vista Calendar
Windows Mail
Windows Meeting Space
Windows Media Center, Media Player, Photo Gallary
Chapter-6 Labs
Lab #1
Lab #2
Lab #3
Lab #4
Lab #5
Lab #6
Lab #7
Users and Groups
Interactive Logon using Security Options in GPO
Logon Settings using GPO
Key Ring Entries
Secure Guest Account
Remote Assistance & Remote Desktop
Remote Desktop Connection
Lab #1 Disk Management
Lab #2 Configuring Dynamic Disk & Volumes Spanned &
Simple Volumes
Lab #3 GPT vs. MBR
Lab #4 Disk Scaling
Lab #5 Diskpart Command
Lab #6 Convert Command
Chapter-10 Labs
Lab #1 NTFS Permissions
Lab #2 Shared Folders
Lab #3 Public Folders
Chapter-11 Labs
Lab #1
Lab #2
Lab #3
Lab #4
Configuring GP settings for Windows Explorer
Sync Center
Offline Files
Disk Quotas
Chapter-12 Labs
Lab #1
Lab #2
Lab #3
Lab #4
Network and Sharing Center
Network Connections & Bridging
Local Area Connection Properties & TCP/IP Settings
IPCONFIG Command & Options
Chapter-7 Labs
Chapter-13 Labs
Lab #1
Lab #2
Lab #3
Lab #4
Lab #5
Lab #6
Lab #7
Lab #8
Lab #9
Power Plans & Power Options
Powercfg Command
Power Management using GPO
Sleep Mode
TCP/IP Addressing Configuration Overview
Netsh Command
Connecting to a Network Projector
Printing
Print Management
Chapter-8 Labs
Lab #1
Lab #2
Lab #3
Lab #4
Lab #5
Lab #6
Lab #7
Group Policy Object Settings Overview
Configuring Policy Templates in GP
Configuring Disk Quota setting in GP
Configuring System Restore settings in GP
Configuring Offline Files settings in GP
Configuring Networking settings in GP
Configuring Remote Assistance settings in GP
Lab #1
Lab #2
Lab #3
Lab #4
Lab #5
Lab #6
Phone & Modem Connection
Creating and Configuring a Dial-up Connection
Creating and Configuring a Broadband Connection
Creating and Configuring a VPN Connection
Enabling or Disabling Windows Firewall per Connection
Proxy Settings
Chapter-14 Labs
Lab #1 Configuring IE settings in Group Policy
Lab #2 Configuring Parental Control
Lab #3 Configuring IE 7 Options Popup Filter, Phishing Filter
www.itttc.net
Chapter-15 Labs
Lab #1
Lab #2
Lab #3
Lab #4
Lab #5
Lab #6
Lab #7
Lab #8
Chkdsk
TPM
BitLocker
Windows Security Center
Windows Firewall
Windows Firewall with Advanced Security
Windows Defender
Configuring Windows Update in GP
Windows Vista Utilities CD
x
x
x
x
Chapter-16 Labs
Lab #1
Lab #2
Lab #3
Lab #4
Lab #5
Lab #6
Event Viewer
Task Scheduler
Windows Easy Transfer
Backup & Restore Center
Task Manager
Reliability and Performance Monitor
www.itttc.net
70-620 Exam
Windows Vista E-books
VMWare Workstation Software
VMWare Workstation Software Training in Farsi
MCTS 70-236
Microsoft Exchange Server 2007 Implementation & Maintenance
Chapter 1 Exchange Server 2007 Deployment
Chapter 5 Exchange Server 2007 Security & Data
Storage Groups
1.1
Overview, Hardware & Editions
1.2
Exchange Server, Windows & Active Directory
5.1
Exchange Server 2007 Security
1.3
Administration Tools
5.2
Exchange Administrator Permissions
1.4
Messaging Roles
5.3
Auditing
1.5
Exchange Server Roles & Active Directory
5.4
Information Store
1.6
Exchange Server & Existing Exchange Organizations
5.5
Content Indexing
Chapter 2 Managing Exchange Server 2007
Chapter 6 Mailbox & Public Folder Database
Clients & Mobile Messaging Users
Administration
2.1
Mail Clients
6.1
Mailbox and Public Folder Database Administration
2.2
Managing Exchange Server Service in Outlook 2007
6.2
Public Folder Databases & Managing Databases
2.3
Mail Profiles
6.3
Managed Folders and Managed Records
2.4
Mobile Messaging Users
6.4
Accessing and Managing Public Folders
2.5
Mobile Device & Wireless Access
2.6
Remote Mail and Outlook Anywhere
Chapter 7 Managing Transport Servers and Client
Access Servers
Chapter 3 Exchange Server 2007 Administration &
Exchange Management Shell
7.1
Managing Hub Transport and Edge Transport Servers
7.2
Completing Transport Server Setup
3.1
Exchange Server 2007 Organizations
7.3
Managing Message Pickup and Replay
3.2
Data Storage
7.4
Managing Accepted Domains & Email Policies
3.3
Message Queues
7.5
Remote Domains, Antispam & Message Filtering Options
3.4
Exchange Management Shell
7.6
Managing Client Access Servers
3.5
Cmdlets
7.7
Enabling POP3 and IMAP4 & Deploying Outlook
Anywhere
Chapter 4 User, Contact, Mailbox Administration,
7.8
Managing Exchange Server Features for Mobile Devices
Groups & Address Lists
Chapter 8 Exchange Server 2007 Maintenance,
4.1
User and Contact Administration
4.2
Managing User Accounts and Mail Features
4.3
Mailbox Administration
8.1
Troubleshooting, Logging & Tracking
4.4
Distribution Groups and Address Lists
8.2
Monitoring Events, Services, Servers, and Resource
Backup & Restore
Usage
8.3
Exchange Queues
8.4
Backing Up and Restoring Exchange Server 2007
8.5
Recovering Exchange Server & Restoring Mailboxes
www.itttc.net
Chapter-9 Exchange Server 2007 Clustering
Solution Center & FAQ
9.1
Clustering Overview
1.7
Exchange Server 2007 Solution Center
9.2
Single Copy Clusters
1.8
Exchange Server 2007 FAQ
9.3
Clustered Continuous Replication Clusters
9.4
High Availability & Server Availability
Exchange Server 2007 Labs
Appendix-A Active Directory Lessons
Lab-0
Installing Exchange Server 2007
Lab-1
Exchange Server 2007 Maintenance Mode
A1
Active Directory Overview
Lab-2
Exchange Management Console Overview
A2
Active Directory Logical & Physical Structures
Lab-3
Windows PowerShell Overview
A3
Active Director Data Store
Lab-4
Exchange Management Shell Overview
A4
Installing & Configuring Active Directory
Lab-5
Microsoft Exchange Security Groups
A5
Active Directory Administrative Consoles
Lab-6
Modify Configuration Domain Controller & Recipient
A6
Domain and Forest Functional Levels
Scope
Appendix-A Active Directory Lessons
Lab-7
Event Viewer Logs & Exchange Services
Lab-8
Recipient Configuration Node (User Mail Box)
Lab-9
Recipient Configuration Node (Room Mail Box)
A7
Active Directory Installation and Removal
Lab-10
Recipient Configuration Node (Equipment Mail Box)
A8
Active Directory Installation Verification
Lab-11
Recipient Configuration Node (Link Mail Box)
A9
Active Directory Setup Logs
Lab-12
Recipient Configuration Node (Mail Contact)
A10
Domain and Forest Functional Levels
Lab-13
Recipient Configuration Node (Mail User)
Lab-14
Distribution & Dynamic Distribution Groups
Lab-15
Recipient Configuration Review
Lab-16
Server Configuration (Mailbox Role)
Lab-17
Mailbox Role : Mailbox & Public Folder Database
Lab-18
Server Configuration (Client Access Role)
Appendix-B Exchange Server 2007 Information
ONLINE HELP
1.1
Exchange 2007 ONLINE Help Overview
Lab-19
Server Configuration (Hub Transport Role)
1.2
Exchange 2007 ONLINE Help Categories
Lab-20
Creating a New SMTP Receive Connector
1.3
Exchange 2007 ONLINE Help Getting Started
Lab-21
Add New Exchange Administrator Role
Lab-22
Configuring Service Startup
Lab-23
Creating a New Address Lists
Lab-24
Managed Default Folders
Product Information & Versions
1.4
Exchange Server 2007 Product Information
Lab-25
Managed Custom Folders
1.5
Exchange Server Version Comparison
Lab-26
Managed Folder Mailbox Policies
Lab-27
Offline Address Book
Lab-28
Assigning Advanced Exchange Server Permissions
Lab-29
Auditing Exchange Server Usage
Service Pack 1 & Update Rollup 1
1.6
Exchange Server 2007 Service Pack 1
Lab-30
Hub Transport: Remote Domains
1.7
Update Rollup 1 for Exchange Server 2007 SP1
Lab-31
Hub Transport: Accepted Domains
www.itttc.net
Exchange Server 2007 Labs
Utilities DVD
Lab-32
Hub Transport: Email Address Policies
x
Exchange Server 2007 Software DVD 32-bit Edition
Lab-33
Hub Transport: Transport Rules
x
Exchange Server 2007 E-books
Lab-34
Hub Transport: Journaling
x
Exchange Server 2007 Installation Components
Lab-35
Hub Transport: Send Connectors
x
VMWare Workstation Software
Lab-36
Hub Transport: Edge Subscriptions
x
VMWare Workstation Training in Farsi
Lab-37
Exchange Server 2007 Performance Counters
x
Exchange Glossary
Lab-38
Mail Client: Outlook 2007 Online Help
x
Exchange Server 2007 Tools
Lab-39
Mail Client: Outlook 2007 Overview
x
Exchange Server 2007 CBT
Lab-40
Mail Client: Outlook 2007 Details
Lab-41
Mail Client: Outlook 2007 Web Site
Lab-42
Toolbox: Best Practice Analyzer
Lab-43
Toolbox: Database Recovery Management
Lab-44
Toolbox: Database Troubleshooter
Lab-45
Toolbox: Mail Flow Troubleshooter
Lab-46
Toolbox: Message Tracking
Lab-47
Toolbox: Queue Viewer
Lab-48
Toolbox: Performance Troubleshooter
Lab-49
Tools Web Site
Lab-50
Exchange 2007 File Paths
Lab-51
Exchange Server 2007 Backup & Restore
Lab-52
Exchange Setup Parameters
Lab-53
Office Outlook Web Access
Lab-54
Creating Multiple Storage Groups
Lab-55
Enabling & Verifying LCR
Lab-56
PowerShell Scripts, Properties & Commands
Lab-57
Unified Messaging: Configuring Dial Plans
Lab-58
Unified Messaging: Configuring IP Gateways
Lab-59
Unified Messaging: Configuring Mailbox Policies
Lab-60
Unified Messaging: Configuring Auto Attendants
www.itttc.net
www.itttc.net
MCTS 70-431
Microsoft SQL Server 2005 Implementation & Maintenance
Chapter 0 Introduction to RDBM & SQL
Chapter 5 Introducing More Database Objects
0.1
Database Basics
5.1
Stored Procedures
0.2
SQL Basics Part I
5.2
Triggers
0.3
SQL Basics Part II
5.3
Event Notifications
5.4
Functions
Chapter 1 Installing Microsoft SQL Server 2005
5.5
User Defined Types
1.1
Introduction to SQL Server 2005
Chapter 6 Implementing Security in SQL Server 2005
1.2
Prerequisites
1.3
Preparing to Install
6.1
SQL Server Security Modes
1.4
Upgrading from a Previous version
6.2
SQL Server Logins & Fixed Server Roles
1.5
Installing SQL Server 2005
6.3
Creating Database User Accounts
1.6
Relational Database Concepts
6.4
Permissions & Permission States
1.7
SQL Server Management Studio
6.5
Database Roles
6.6
Ownership Chains
6.7
Linked Server Security
6.8
Encryption & Security Plan
Chapter 2 Creating and Configuring Databases
2.1
Planning your database
2.2
Filegroups
2.3
Database File Placement
2.4
Creating Data Storage Structures
7.1
Transactions
2.5
Estimating Storage Requirements
7.2
Populating Tables
2.6
Creating and Configuring Databases
7.3
Bulk Inserting XML & Bulk-Logged Recovery Model
7.4
Supporting Different Collation Types and Orders When
Chapter 7 Working with Relational Data
Querying Data
Chapter 3 Working with Tables and Views
7.5
Casting and Converting
3.1
Planning Tables
7.6
Datatype Precedence & Collations
3.2
Introducing Built-in Data Types
7.7
Error Handling
3.3
Creating Tables
3.4
Restricting the Data
3.5
Partitioning Tables
3.6
Understanding Views
Chapter 4 Performing Indexing and Full-Text
Chapter 8 Working with XML Data
8.1
XML Data, Datatypes & XML Schema
8.2
Querying XML Data
8.3
Creating XML Indexes
Searching
Chapter 9 Working with Service Broker and HTTP
4.1
Index Architecture
9.1
Service Broker
4.2
Clustered Indexes
9.2
Working with Service Broker
4.3
Non-Clustered Indexes
9.3
Using Service Broker
4.4
Indexes, Primary Keys & Full Text Searching
9.4
HTTP Endpoints
www.itttc.net
Chapter 10 Maintaining and Automating SQL Server
10.1
Maintaining Indexes
10.2
Maintaining Statistics
10.3
Maintaining Databases
10.4
Automation Basics
10.5
Configuring Database Mail
10.6
Creating Operators & Jobs
10.7
Creating Alerts
10.8
Maintenance Plan Wizard & Copying Databases
Section-1 Labs
Lab 1.1 Installing SQL Server 2005
Lab 1.2 Installing SQL Server 2005 Service Pack 2
Lab 1.3 SQL Server Management Studio Overview
Lab 1.4 Installing the 2nd Instance
Lab 1.5 Exploring the SQL Server Management Studio
Chapter 11 Performing Backups and Restores
11.1
Backup a Database
11.2
Restoring a Database
11.3
Devising a Backup Strategy
70-431 SQL Server 2005 Labs
Lab 1.6 Creating Tables
Section-2 Labs
Lab 2.1 Creating a Database using Management Studio
Lab 2.2 Gathering Information about your Database
Lab 2.3 Setting Database Options
Chapter 12 Achieving High Availability through
Section-3 Labs
Replication
Lab 3.1 Creating the Products Table
12.1
Introducing Replication
12.2
Introducing the Publisher Subscriber Metaphor
12.3
Replication Factors and Distribution
12.4
Replication Internals
12.5
Replication Types
12.6
Publication & Distributor Issues
12.7
Replication Models
12.8
Replicating over the Internet and to Heterogeneous
Lab 3.2 Creating the Customers Table
Lab 3.3 Creating the Orders Table
Lab 3.4 Creating the Valid Zip Code Constraint
Lab 3.5 Testing your Constraint
Lab 3.6 Creating Default Constraint
Lab 3.7 Creating a Unique Constraint
Lab 3.8 Creating a Partition Function and Schema
Database Servers
12.9
Lab 3.9 Creating the Contact_in_398 View
Lab 3.10 Creating an Updatable View
Installing, Using & Managing Replication
Section-4 Labs
Chapter 13 Introducing More High-Availability Methods
Lab 4.1 Creating a Table Scan
13.1
Choosing the High-Availability Features You Need
13.2
Database Mirroring Overview
13.3
Database Mirroring Implementation
13.4
Log Shipping
13.5
Database Snapshots
Lab 4.2 Creating an Index
Lab 4.3 Creating a Primary Key
Lab 4.4 Creating a Full-Text Catalog & Index
Chapter 14 Monitoring and Optimizing SQL Server 2005
14.1
System Monitor
14.2
SQL Profiler & Database Engine Tuning Advisor
14.3
Troubleshooting SQL Server
www.itttc.net
Lab 8.10 Creating an Alert for a Standard Error
Section-5 Labs
Lab 8.11 Testing an Alert with RAISEERROR()
Lab 5.1 Viewing System Stored Procedures in Object Explorer
Lab 8.12 Creating and Firing an Alert Based on a Custom Error
Lab 5.2 Using Predefined Templates
Lab 8.13 Creating a Performance Alert
Lab 5.3 Creating a Simple Stored Procedure
Lab 8.14 Creating a WMI Alert
Lab 5.4 Creating a DDL Trigger
Lab 8.15 Maintenance Plan Wizard
Lab 5.5 Creating a Scalar User-Defined Function
Lab 8.16 Copy Database Wizard
Lab 5.6 Creating a T-SQL User-Defined Type
Section-9 Labs
Section-6 Labs
Lab 9.1 Creating a Permanent Backup Device
Lab 6.1
Setting the Authentication Mode
Lab 9.2 Performing a Full Backup
Lab 6.2
Creating Standard Logins
Lab 9.3 Performing a Differential Backup
Lab 6.3
Creating Windows Accounts
Lab 9.4 Performing a Transaction Log Backup
Lab 6.4
Creating SQL Server Logins for Windows Accounts
Lab 9.5 Performing a Filegroup Backup
Lab 6.5
Testing SQL Server Logins for Windows Accounts
Lab 9.6 Backing Up to Multiple Devices
Lab 6.6
Adding Logins to Fixed Server Roles
Lab 9.7 Restoring a Database
Lab 6.7
Creating User Accounts in AdventureWorks
Lab 6.8
Statement and Object Permissions
Lab 6.9
Adding Users to Fixed Database Roles
Section-10 Labs
Lab 6.10 Creating and Adding Users to Custom Database
Roles
Lab 6.11 Creating an Application Role
Lab 10.1 Installing a Distribution Server
Lab 10.2 Creating a Publication
Lab 10.3 Creating a Subscription
Lab 10.4 Replication Monitor
Section-7 Labs
Section-11 Labs
Lab 7.1 bcp & sqlcmd parameters
Lab 7.2 Bulk-Logged Recovery Model
Lab 11.1 System Monitor
Lab 7.3 TRY…CATCH Block
Lab 11.2 Creating a Trace with Profiler
Lab 11.3 Replaying a Trace
Section-8 Labs
Lab 11.4 Database Engine Tuning Advisor
Lab 11.5 Reading SQL Server & Windows Event Logs
Lab 8.1
Reconstructing an Index
Lab 11.6 Activity Monitor
Lab 8.2
Updating Index Statistics
Lab 11.7 Connecting to the DAC
Lab 8.3
Using DBCC CHECKDB on AdventureWorks
Lab 8.4
Shrinking the Database
Lab 8.5
Configuring a Mailhost
Lab 8.6
Configuring the SQL Server Agent to Use the
A1 SQL Server 2005 Books Online
Mailhost
A2 SQL Server 2005 Product Information
Lab 8.7
Configuring an Operator
A3 Update package 7 for SQL Server 2005 Service Pack 2
Lab 8.8
Creating a Fail-Safe Operator
A4 SQL Server 2005 Solution Center
Lab 8.9
Creating a Job
A5 SQL Server 2008 Product Information
Appendix-A
www.itttc.net
SQL Server 2005 & 2008
70-431 Utilities DVD
x
SQL Server 2005 E-books
x
70-431 Exam
x
SQL Server 2005 Software Evaluation Edition (CD-1,
CD-2 & SP1)
x
VMWARE Software
x
SQL Server CBT
www.itttc.net
Cisco
CCNA
CCNP
Cisco VoIP
www.itttc.net
www.itttc.net
CCNA 640-802 (ICND-1 640-822 + ICND-2 640-816)
Cisco Certified Network Associate
Routing Units
Chapter-0 Evolving Network Model
0.1
IIN & SONA
0.2
Campus Network
0.3
Enterprise Model
Unit-4 IP Routing & Routing Protocols
4.1
Distance Vector vs. Link State Routing
4.2
Link State Operation
4.3
Routing Updates
4.4
Routing Tables
Unit-5 Dynamic Routing Protocols Part I
Unit-1 Internetworking
1.1
Internetworking
1.2
OSI Model
1.3
Ethernet Networks
1.4
Ethernet Cabling
1.5
Network Domain
1.6
Ethernet Addressing
1.7
Cisco 3-Layer Hierarchical Model
1.8
Ethernet Frame Types
Unit-2 TCP/IP Addressing & Protocols
2.1
IP Addressing Overview
2.2
IP Subnetting Part I
2.3
VLSM Part I
2.4
NAT Overview
5.1
RIP v1 Overview
5.2
IGRP Overview
5.3
EIGRP Overview
5.4
OSPF Overview
Unit-6 Managing a Cisco Router & Internetwork
6.1
Router Configuration Register
6.2
Router Password Recovery
6.3
IOS Image Backup and Upgrade
6.4
IP Host Tables
Unit-7 IP Access Lists
7.1
Standard IP Access List
7.2
Extended IP Access List
Unit-3 Basic Router Configuration
Switching & WAN Units
3.1
Cisco Routers
Unit-1 Layer-2 Switching
3.2
Connecting to a Cisco Router
3.3
Booting a Cisco Router
1.1
Ethernet Overview
3.4
Cisco Router Components
1.2
Switch vs. Bridge
3.5
Cisco Router Models
1.3
Switch Functions
3.6
Cisco Router Passwords
1.4
How a Switch Works (Example)
3.7
Cisco Router Commands
1.5
LAN Switch Types
3.8
Cisco Router Banner
1.6
Configuring Cisco 1900 Series
3.9
Cisco Router Interfaces
1.7
Configuring Cisco 2950 Series
3.10 Cisco Router Serial Interfaces
1.8
Cisco Switch Verification
3.11 Router Configuration Commands
1.9
Switch Port Security
3.12 Troubleshooting
1.10
Static MAC Addresses
3.13 Verifying Router Configuration
1.11
Port Security on 1900
www.itttc.net
1.12
Port Security on 2950
5.4E
Example: LMI Configuration
1.13
CDP Overview
5.5
Frame Relay Congestion Control
1.14
CDP Commands
5.6
Subinterfaces
5.7
Monitoring Frame Relay
Unit-2 Spanning Tree Protocol
Routing, Switching & WAN Part II
2.1
STP Overview
2.2
STP Terminology
2.3
STP Operation
2.4
STP Port States
2.5
When to use STP
2.6
STP Examples
Unit-3 Virtual LANs
3.1
VLAN Overview
3.2
VLAN Trunking
3.3
VLAN Trunking Protocols
3.4
VTP Pruning
3.5
Routing between VLANs
3.6
Configuring VLANs
3.7
Configuring Trunk Ports
3.6
Configuring Inter-VLAN Routing
3.7
Configuring VTP
Unit-4 Wide Area Network
4.1
Introduction to WANs
4.2
WAN Terminology
4.3
WAN Interface Types
4.4
WAN Connection Types
4.5
WAN Protocols (HDLC)
4.6
WAN Protocols (PPP & Its Components)
4.7
PPP LCP Configuration Options
4.8
PPP Session Establishment & Auth. Methods
4.9
Configuring & Verifying PPP
Unit-5 Frame Relay
5.1
Introduction to Frame Relay
5.2
Frame Relay Technology and Terminology
5.3
Frame Relay Encapsulation, VCs & DLCI
5.4
Local Management Interface
Unit-1 TCP/IP Addressing & Protocols
1.1
IP Subnetting Part II
1.2
VLSM Part II
1.3
TCP/IP Suite Overview
1.4
Application Layer Protocols
1.5
Transport Layer Protocols
1.6
Internet Layer Protocols
Unit-2 Cisco’s IOS and Security Device Manager
2.1
SSH, Do Command & using the PIPE
2.2
Cisco Security Device Manager (SDM)
2.3
Cisco ASDM 5.2 for ASA (Demo)
2.4
SDM User Guide
Unit-3 IP Routing & Routing Protocols
3.1
Routing Basics
3.2
IP Routing Examples
3.3
Routing Loops
3.4
RIPv2
Unit-4 Dynamic Routing Protocols Part II
4.1
EIGRP Overview
4.2
Configuring EIGRP
4.3
OSPF
4.4
Configuring OSPF
4.5
Configuring EIGRP & OSPF Summary Routes
4.6
Route Redistribution
Unit-5 Managing a Cisco Router & Internetwork
5.1
Boot System Command and using Cisco IFS
5.2
Using SDM 5.2 for ASA to Manage Configuration Files
www.itttc.net
Unit-6 Layer-2 Switching & Advanced STP Topics
11.5
Migrating to IPv6
11.6
Configuring IPv6
6.1
Cisco 2960 Switches
6.2
Switching Services
6.3
PostFast, UplinkFast & BackboneFast
6.4
RSTP & Etherchannel
12.1 Cable & DSL
6.5
Catalyst Switch Configuration
12.2 Using SDM for WAN Connections
6.6
Getting Started with Cisco Network Assistant
12.3 VPNs
Unit-12 WAN Part II
12.4 Introduction to Cisco IOS IPSec
12.5 Using ASDM 5.2 for ASA for VPN & IPSec
Unit-7 Voice VLANs
12.6 Effective Bandwidth
7.1
Configuring Voice VLANs & IP Phone Voice Traffic
7.2
Using the CNA to Configure VLANs & Inter-VLAN
Unit-13 Cisco Special Topics
Routing
13.1 Telephony Network
13.2 PBX vs. Key System
Unit-8 Security
13.3 Signaling
8.1
Secured Networking and Cisco IOS Firewalls
13.4 VoIP Network Components & Advantages
8.2
Advanced ACLs
13.5 Overview of Traffic Types
13.6 Multicast Addressing
13.7 DHCP Overview
Unit-9 Network Address Translation
13.8 Configuring DHCP
9.1
NAT, NAT Types & NAT Names
9.2
How NAT Works
9.3
Testing & Troubleshooting NAT
9.4
Using ASDM 5.2 for ASA to Configure NAT
13.9 DHCP Verification Commands
Routing Labs
Unit-10 Cisco’s Wireless Technologies
Lab-1
Basic Router Configuration
Lab-2
Routing in Two Subnets
Lab-3
Routing in Four Subnets
10.1
Wireless Networking Overview
Lab -4 Using Static and Default Routes
10.2
802.11 Standards
Lab -5 Serial Communication
10.3
Cisco’s Unified Wireless Solution
Lab -6 Configuring RIPv1
10.4
Split MAC Architecture
Lab -7 Configuring IGPR
10.5
Wireless Security
Lab -8 Configuring EIGRP
Lab -9 Configuring OSPF
Unit-11 IPv6
Lab -10 Configuring IP ACLs
11.1
Needs and Benefits of IPv6
11.2
IPv6 Addressing & Address Types
11.3
IPv6 Autoconfiguartion
11.4
Configuring Cisco Routers with IPv6, DHCPv6 &
ICMPv6
11.5
IPv6 Routing Protocols
www.itttc.net
Switching and WAN Labs
x
CCNA 640-802 Exam
x
Cisco Configuration Whitepapers (12)
x
Cisco Tools Configuration Guides:
Lab-1
PC to PC Communication
Lab-2
Configuring CDP
x
Cisco Switch 2960 Configuration Guide
Lab-3
LAN Switching 2950
x
Cisco Network Assistant
Lab-4
Configuring 1900 Series Switches
x
Cisco Security Device Manager
Lab-5
Configuring the 2950 Switches
Lab-6
Configuring STP on 1900 Series
Lab-7
Configuring VLAN on 1900 Series
Lab-8
Configuring VLAN on 2950 Switches
Lab-9
Configuring VLAN Trunking
Cisco CCNA 640-802 Video Mentor (ICND-1 & ICND-2) Labs
ICND1 Labs
Lab-10 Configuring & Verifying PPP
Lab 1 Navigating a Router/Switch Command-Line Interface
Lab-11 Configuring and Verifying Frame Relay
Lab 2 Router Configuration and Managing Configuration Files
Lab-12 Configuring and Verifying FR Subinterfaces
Lab 3 Switch Basics: Learning, Forwarding/Filtering, and
Interface Settings
Lab 4 Finding the Subnet Number
Review Scenarios
Lab 5 Finding the Broadcast Address and Range of Addresses
in a Subnet
x
OSI, Ethernet, NAT , Connections
x
TCP/IP Protocols, Addressing, Subnetting
x
IOS Commands, Routes, IP Routing Table
x
CDP & Administrative Distance
x
Routing Protocols
x
RIP, IGRP, EIGRP & OSPF
x
Switch & Switch Configuration
x
STP General, Port States, Root Bridge
x
VLAN Configuration, VLAN Troubleshooting, VTP
x
Configuration Registration, Password Recovery,
Lab 6 Finding All Subnets of a Network with Less Than 8
Subnet Bits
Lab 7 IP Subnet Design and Implementation
Lab 8 Static and Connected Routes
Lab 9 RIP Configuration
ICND2 Labs
Configuration Files, IOS Images
Lab 1
Configuring VLANs
Lab 2
VTP Servers and Clients
Lab 3
RIP V1 with Split Horizon, Route Poisoning, and Poison
x
Standard IP ACLS, Extended IP ACLs
x
WAN (HDLC & PPP & ATM)
Lab 4
Single Area and Multi-area OSPF Configuration
x
Frame Relay General & Configuration
Lab 5
EIGRP Configuration and Operation
Lab 6
Understanding EIGRP Metric Calculations
Lab 7
NAT Overload (PAT)
Lab 8
IPv6 Subnetting and Address Configuration
Reverse
ITTTC CCNA 640-802 Utilities CD
x
Boson NetSIM 6
Lab 9
PPP and CHAP Configuration
x
Cisco CCNA Discovery & Exploration
Lab 10
Access Lists
x
E-books
Lab 11
Access Lists II
x
Tools: ADSM 5.21, IP Subnet Calculator, SDM, Wildcard
Calculator
x
CCNA 640-802 Video Mentor Labs
www.itttc.net
CCNP BSCI 642-901
Building Scalable Cisco Internetworks
Chapter-0 Evolving Network Model
Chapter-6 EIGRP in Scalable Networks
0.1
IIN & SONA
6.1
EIGRP Usage
0.2
Campus Network
6.2
EIGRP Scalability
0.3
Enterprise Model
Chapter-7 Integrated IS-IS
Chapter-1 IP Routing Principles
7.1
Integrated IS-IS Overview
1.1
Routing Fundamentals
7.2
Integrated IS-IS Operation
1.2
Routing Environment and Protocols
7.3
Configuring Integrated IS-IS
1.3
Routing Protocols and Convergence
7.4
Verifying and Troubleshooting Integrated IS-IS
1.4
Routing Table Analysis
Chapter-8 Configuring BGP
Chapter-2 IP Addressing
8.1
BGP Overview
2.1
IP Addressing Overview
8.2
BGP Terminology and Attributes
2.2
VLSM Fundamentals
8.3
BGP Operation
2.3
Route Summarization
8.4
BGP Configuration
2.4
CIDR Mechanism and Helper Address
CS
Case Study: BGP
Chapter-3 Configuring OSPF in a Single Area
Chapter-9 Implementing BGP in Scalable Networks
3.1
OSPF Fundamentals
9.1
BGP Scalability Issues and Solutions
3.2
OSPF Operating Environments
9.2
Policy Control Fundamentals
3.1
Configuring OSPF in a Single Area
9.3
Multihoming
9.4
Redistributing with IGPs
CS
Case Study: Prefix Lists
CS
Case Study: Multihomed BGP
Chapter-4 Interconnecting Multiple OSPF Areas
4.1
Creating Multiple OSPF Areas
4.2
OSPF Operation Across Multiple Areas
4.3
Configuring OSPF Multiarea Components
4.4
Route Summarization
10.1
Routing Protocols and Redistribution
CS
Case Study: Multiarea OSPF Configuration
10.2
Configuring Redistribution
10.3
Controlling Routing Update Traffic
Chapter-5 EIGRP Operation and Configuration
CS
Case Study: Redistribution
5.1
EIGRP Fundamentals
Chapter-11 Policy Based Routing Configuration
5.2
EIGRP Operation
5.3
EIGRP Configuration
Chapter-10 Network Connections
11.1
Route Maps
11.2
Policy Based Routing
www.itttc.net
Chapter-12 Multicasting
12.1
Overview of Traffic Types
12.2
Multicast Addressing
12.3
Client Registration
12.4
Multicast Routing
12.5
Multicasting and Switches
12.6
Configuring your RPs
Chapter-13 DHCP & Configuration
CCNP BSCI Utilities CD
BSCI Labs
Lab-1
Configuring EIGRP
Lab-2
Configuring OSPF for Multiple Areas and Frame Relay
Nonbroadcast
Lab-3
Configuring Multihome BGP
Lab-4
Configuring Multicast
Tools, Whitepapers & Exam
13.1
DHCP Overview and Addressing
13.2
Configuring DHCP
13.3
IP Helper Address and DHCP Relay Services
x
ADSM 5.21
13.4
DHCP Verification Commands
x
IP Subnet Calculator
13.5
Configuring DHCP
x
Packet Tracer
x
Security Device Manager (SDM)
x
Wildcard Calculator
x
NetSIM 6
Chapter-14 IPv6
14.1
IPv6 Overview & Address Representation
x
Cisco Configuration Whitepapers (17 Whitepaper)
14.2
IPv6 Header Fields
x
642-901 Practice Exam
14.3
IPv6 Address Types & Mobility
14.4
IPv6 Routing using OSPFv3
14.5
Configuring and Verifying OSPFv3
14.6
IPv6-to-IPv4 Transition Mechanisms
Cisco BSCI Flash Simulation Labs
Lab-1
Network Discovery - Router 1
Lab-2
Network Discovery - Router 2
Lab-3
Network Discovery - Router 3
Lab-4
IP Address - Helper Command
Lab-5
Configuring Single Area OSPF
Lab-6
Verifying Single Area OSPF
Lab-7
Configuring OSPF- NBMA Environment
Lab-8
Enabling OSPF- NBMA Network
Lab-9
Configure Multi-area OSPF Network
Lab-10
Configure Multi-area OSPF Network II
Lab-11
Stub Areas
Lab-12
Totally Stubby Areas
Lab-13
Not So Stubby Areas – Creation
Lab-14
Virtual Links – Setup
Lab-15
Virtual Links – Creation
Lab-16
Redundant EIGRP - Routers A-C
Lab-17
Redundant EIGRP - Routers D-E
Lab-18
Redundant EIGRP - Testing
www.itttc.net
Lab-19
EIGRP Across Frame - Relay I
Lab-20
EIGRP Across Frame - Relay II
Lab-21
Configuring BGP
Lab-22
Configuring Basic BGP
Lab-23
Creating a BGP Route Reflector
Lab-24
BGP Route Reflection AS 100
Lab-25
BGP Route Reflection AS 100 and 300
Lab-26
BGP Route Reflection - Router C
Lab-27
Configuring BGP Connection Weight
Lab-28
Route Redistribution - Routers A and B
Lab-29
Route Redistribution - Routers C and D
Lab-30
Route Redistribution – Verification
Lab-31
Modifying Redistributed Administrative Distances
Lab-32
Redistribution with Route Filters
Lab-33
Route Map Creation
Lab-34
IGRP Integration
Lab-35
Directed-Broadcast Handling
www.itttc.net
www.itttc.net
CCNP ONT 642-845
Optimizing Converged Cisco Networks
Chapter-0 Evolving Network Model
Chapter 6 Implementing QoS Pre-Classify and Deploying
End-to-End QoS
0.1 IIN & SONA
0.2 Campus Network
6.1
Implementing QoS Pre-Classify
0.3 Enterprise Model
6.2
Deploying End-to-End QoS
Chapter 1 Cisco VoIP Implementations
Chapter 7 Implementing AutoQoS
1.1
Introduction to VoIP Networks
7.1
Introducing AutoQoS
1.2
Digitizing & Packetizing Voice
7.2
Implementing and Verifying AutoQoS
1.3
Encapsulating Voice Packets
7.3
AutoQoS Shortcoming and Remedies
1.4
Bandwidth Calculation
1.5
Implementing VoIP Support in Enterprise Network
Chapter 2 IP QoS
2.1
Introduction to QoS
2.2
Identifying and Comparing QoS Models
2.3
QoS Implementation Methods
Chapter 8 Wireless LAN QoS, Security & Management
8.1
Wireless LAN QoS
8.2
Wireless LAN Security
8.3
Wireless LAN Management
Chapter 9 Cisco Special Topics
Chapter 3 Classification, Marking & NBAR
9.1
Cisco Security Device Manager
9.2
Cisco Network Assistant
3.1
Classification and Marking
9.3
Cisco AutoQoS Animation
3.2
The DiffServ, DSCP & PHBs
9.4
Cisco IOS QoS Animation
3.3
QoS Service Class, Trust Boundaries & NBAR
9.5
Cisco QoS Solutions Configuration Guide
3.4
Configuring NBAR using IOS
Chapter 4 Congestion Management and Queuing
ONT Review Scenarios
4.1
Effective Bandwidth
x
Cisco VoIP Implementations
4.2
Congestion Management and Queuing
x
IP QoS
4.3
Weighted Fair Queuing
x
Classification, Marking & NBAR
4.4
Class-Based Weighted Fair Queuing
x
Congestion Management and Queuing
4.5
Low Latency Queuing
x
Congestion Avoidance, Policing, Shaping, and Link
4.6
Queuing Comparison
Efficiency Mechanisms
x
Chapter 5 Congestion Avoidance, Policing, Shaping, and
Link Efficiency Mechanisms
5.1
Congestion Avoidance
5.2
Traffic Shaping and Policing
5.3
Link Efficiency Mechanisms
Implementing QoS Pre-Classify and Deploying
End-to-End QoS
x
Implementing AutoQoS
x
Wireless LAN QoS, Security & Management
www.itttc.net
CCNP ONT Utilities CD
ONT Labs
Lab-1
Placing and Examining VoIP Calls
Lab-2
Configuring CB-WFQ and LLQ Queuing Mechanisms
Lab-3
Configuring Class-Based Header Compression
Lab-4
Configuring LFI
Tools, Ebooks, Whitepapers
x
ADSM 5.21
x
IP Subnet Calculator
x
Packet Tracer
x
Security Device Manager (SDM)
x
Wildcard Calculator
x
NetSIM 6
x
Cisco Configuration Whitepapers
x
Cisco ONT CBT
www.itttc.net
CCNP ISCW 642-825
Implementing Secure Converged Wide Area Networks
Chapter-1 Network Conceptual Models
Chapter-5 Cisco Device Hardening
1.1
IIN and SONA
5.1
Mitigating Network Attacks
1.2
Introduction to Campus Network
5.2
Disabling unused Cisco Router Network Services &
1.3
Enterprise Model
Interfaces
5.3
Securing Cisco Router Installations and Administrative
Access
Chapter-2 Providing SOHO Teleworker Connectivity
5.4
Mitigating Threats and Attacks with Access Lists
2.1
Providing SOHO Teleworker Connectivity
5.5
Securing Management and Reporting Features
2.2
Cable Technology
5.6
Configuring AAA on Cisco Routers
2.3
DSL Technology
2.4
Layer-2 over DSL
2.5
Configuring DSL CPE
2.6
Troubleshooting ADSL
Chapter-6 Cisco IOS Threat Defenses
Chapter-3 Frame Mode MPLS
6.1
Introducing the Cisco IOS Firewall
6.2
Configuring the Cisco IOS Firewall
6.3
Introducing the Cisco IOS IPS
6.4
Configuring the Cisco IOS IPS
3.1
Introducing MPLS Networks
3.2
MPLS & MPLS VPN Terminology
3.3
Frame Mode MPLS & CEF
3.4
MPLS Routers and MPLS Labels

Providing SOHO Teleworker Connectivity
3.5
Label Distribution and Label Tables

Frame Mode MPLS
3.6
Penultimate Hop Popping

IPSec
3.7
Configuring Frame Mode MPLS

Cisco Device Hardening
3.8
MPLS VPNs

Cisco IOS Threat Defenses
3.9
Handling Customer Routes
ISCW Review Scenarios
CCNP ISCW Utilities CD
Chapter-4 IPSec
ISCW Labs
4.1
IPSec
4.2
Establishing an IPSec VPN
Lab-1
Configuring Frame Mode MPLS
4.3
Configuring a Site-to-Site VPN using SDM
Lab-2
Configuring Site-to-Site VPN
4.4
Using and Configuring GRE Tunnel with IPSec
Lab-3
Securing Cisco Routers
4.5
High Availability VPNs
Lab-4
Configuring an IOS Firewall
4.6
Cisco Easy VPN & Configuring VPN Client
Tools, Ebooks, Whitepapers

ADSM 5.21 / IP Subnet Calculator

Packet Tracer 5 / Security Device Manager (SDM)

Wildcard Calculator / Cisco Configuration Whitepapers

Cisco ISCW CBT / ISCW Exam
www.itttc.net
www.itttc.net
CCNP BCMSN 642-815
Building Cisco Multilayer Switched Networks
Chapter-1
Network Requirements
Chapter-5
Enhancements to STP
1.1
IIN & SONA
5.1
Cisco Enhancements to STP
1.2
Campus Network
5.2
Rapid STP
1.3
Enterprise Model
5.3
Multiple Spanning Tree
1.4
Nonhierarchical Network Devices.ppt
5.4
EtherChannels
5.5
EtherChannel Configuration Commands
5.6
Other STP Enhancements
5.7
Troubleshooting Tips & Debug Commands
Chapter-2
Basic Switch Operation
2.1
Layer-2 Switch Operation
2.2
Multi Layer Switch Operation
2.3
Switching Tables
2.4
Troubleshooting Switching Tables
Chapter-3
Chapter-6
VLANs
Implementing InterVLAN Routing
6.1
Routing Considerations
6.2
Configuring Routing between VLANs
6.3
Routing Configuration on a Switch
6.4
Router on a Stick Setup
3.1
VLANs
6.5
Multi Layer Switching (MLS) Overview
3.2
VLAN Implementations
6.6
MLS using CEF
3.3
VLAN Assignment
6.7
CEF Example
3.4
Trunks & Frame Tagging
3.5
VLAN Tagging Mechanisms
Chapter-7
3.6
Native VLANs
Networks
3.7
VLAN Ranges, Mapping & Services
3.8
Dynamic Trunk Protocol
7.1
Introducing HSRP Part I
3.9
Configuring, Verifying & Troubleshooting Trunk
7.2
Introducing HSRP Part II
Connections
7.3
Configuring HSRP
3.10
VLAN Trunk Protocol
7.4
Virtual Router Redundancy Protocol (VRRP)
3.11
Configuring, Verifying and Troubleshooting VTP
7.5
Gateway Load Balancing Protocol (GLBP)
7.6
Redundancy with Switch Chassis Part I
7.7
Redundancy with Switch Chassis Part II
Chapter-4
Implementing STP
Implementing High Availability in Campus
4.1
Transparent Bridging
4.2
Spanning Tree Protocol (STP)
4.3
STP Components & Operation
8.1
WLAN Overview
4.4
STP Algorithm
8.2
802.11 Standards
4.5
Spanning Trees
8.3
Cisco's Unified Wireless Solution
4.6
Configuring and Verifying STP
8.4
Split MAC Architecture
8.5
Wireless Security
8.6
WLAN QoS
8.7
WLAN Security
8.8
WLAN Management
Chapter-8
www.itttc.net
Wireless LANs
Chapter-9
Configuring Campus Switches to Support
BCMSN Review Scenarios
Voice

Implement VLANs
9.1
Power Over Ethernet (PoE)

Conduct the operation of STPs in a hierarchical network
9.2
Configuring & Verifying PoE

Implement Inter-VLAN routing
9.3
Voice VLANs

Implement gateway redundancy technologies
9.4
Voice QoS

Describe and configure wireless client access
9.5
Diffserve QoS

Describe and configure security features in a switched
9.6
Implementing QoS for Voice
network
9.7
AutoQoS

9.8
Verifying Voice QoS
Configure support for voice
CCNP BCMSN Utilities CD
Chapter-10
Securing your Switch
BCMSN Labs
10.1
Switch Security
Lab-1
Configuring VLANs and VTP
10.2
Authentication, Authorization & Accounting (AAA)
Lab-2
Routing Between VLANs
10.3
Switch Port Security
Lab-3
Enabling and Optimizing HSRP
10.4
Port-based Authentication with 802.1X
Lab-4
Configuring IP Telephony Support
10.5
VLAN ACLs
10.6
Private VLANs (PVLAN)
10.7
PVLAN Configuration
10.8
Mitigating Spoofing Attacks
Tools, Ebooks, Whitepapers

ADSM 5.21

IP Subnet Calculator

Packet Tracer 5

Security Device Manager (SDM)

Wildcard Calculator

Cisco Configuration Whitepapers

BCMSN CBT

BCMSN Exam
www.itttc.net
Introduction to Cisco Voice over IP
Chapter-1 Introduction to Telephony Network
Chapter-6 Quality of Service
1.1
Telephony Network
6.1
Effective Bandwidth
1.2
PBX vs. Key System
6.2
Configuring QoS
1.3
Signaling
6.3
Voice Priority
1.4
VoIP Network Components and Advantages
6.4
Congestion Management
6.5
Policing and Shaping
6.6
Shaping Frame Relay Networks
6.7
Using Compression
6.8
Applying AutoQoS
Chapter-2 Digitizing Voice
2.1
Sampling
2.2
Nyquist Theorem
2.3
Waveform Compression
2.4
Voice Bandwidth Calculation
Chapter-3 Preparing for a VOIP Network
Chapter-7 Unified Messaging
7.1
Unified Messaging
7.2
Conference Calling
7.3
Call Centers
3.1
PBX Reliability
3.2
Reliability vs. Availability
3.3
Replacing PBX Trunks
3.4
Connecting a Router to a Phone Line
3.5
Connecting a Router to a Digital Circuit
x
Chapter-1
VoIP Case Study
3.6
VoIP in the Home
x
Chapter-2
VoIP Case Study
x
Chapter-3
VoIP Case Study
x
Chapter-4
VoIP Case Study
x
Chapter-5
VoIP Case Study
x
Chapter-6
VoIP Case Study
x
Chapter-7
VoIP Case Study
Chapter-4 Cisco Call Manager
4.1
Cisco Call Manager
4.2
CCM Roles and Redundancy
4.3
Placing Cisco CallManagers in the Network
4.4
Partitions and Calling Search Spaces
4.5
Replacing Old Phones with IP Phones
4.6
Selecting Features for IP Phones
4.7
Securing Voice
4.8
Adding Video to Voice Calls
4.9
Cisco Call Manager Express
Chapter-5 Gateway Protocols
5.1
Gateway Protocols
5.2
H.323
5.3
Cisco’s MGCP
5.4
SIP
Cisco VoIP Case Studies
Voice Bandwidth Calculators
VoIP Utilities CD
x
VoIP Related Articles
x
VoIP Related Ebooks
x
WAN Configuration Review Ebooks
x
Information on CCVP Certification
www.itttc.net
www.itttc.net
CWNP
CWNA
www.itttc.net
www.itttc.net
CWNA: Certified Wireless Network Administrator
Chapter-1 Introduction to Wireless LANs
5.11 WLAN Accessories: RF Pigtail Adapter Cable
5.12 WLAN Accessories: Frequency Convertors
1.1 History of WLANs
5.13 WLAN Accessories: Bandwidth Control Units
1.2 Today’s WLAN Standards
5.14 WLAN Accessories: Test Kits
1.3 Applications of WLAN
Chapter-6 Wireless LAN Organizations and Standards
Chapter-2 Radio Frequency (RF) Fundamentals
6.1 FCC, ISM & UNII Bands
2.1 Concepts of RF behavior
6.2 Power Output Rules & WLAN Standards
2.2 RF Terminology
6.3 WLAN Organizations
2.3 VSWR (Voltage Standing Wave Ratio)
2.4 Line of Sight
Chapter-7 802.11 Network Architecture
2.5 Calculating Power
7.1 Locating a Wireless LAN
Chapter-3 Spread Spectrum Technology
7.2 SSIDs
7.3 Beacons
3.1 Spread Spectrum and its applications
7.4 WLAN Scanning
3.2 Spread Spectrum Technology: FHSS
7.5 Authentication & Association
3.3 Spread Spectrum Technology: DSSS
7.6 WLAN Authentication Methods
3.4 Comparing FHSS vs. DSSS
7.7 Emerging Wireless Security Solutions
7.8 Service Sets
Chapter-4 Wireless LAN Infrastructure Devices
7.9 Roaming
7.10 VPN Solutions
4.1 Wireless LAN Infrastructure devices
7.11 Power Management Features
4.2 Access Point Options
4.3 Configuration & Management
Chapter-8 MAC & Physical Layers
4.4 Wireless Bridge
4.5 Wireless Workgroup Bridge
8.1 Wireless LAN Frames vs. Ethernet Frames
4.6 Wireless LAN client devices
8.2 Collision Handling
4.7 Wireless LAN gateway devices
8.3 Fragmentation
8.4 Dynamic Rate Shifting
Chapter-5 Antennas and Accessories
8.5 Distributed Coordination Function
8.6 Inter-Frame Spacing
5.1 RF Antenna Types
8.7 Slot Time
5.2 RF Antenna Concepts
8.8 Communication Process
5.3 RF Antenna Installation
8.9 RTS / CTS
5.4 PoE Devices
8.10 Configuring RTS / CTS
5.5 WLAN Accessories: Amplifiers
8.11 Modulation
5.6 WLAN Accessories: Attenuators
5.7 WLAN Accessories: Lightening Arrestors
5.8 WLAN Accessories: RF Splitters
5.9 WLAN Accessories: RF Connectors
5.10 WLAN Accessories: RF Cables
www.itttc.net
Chapter-9 Troubleshooting Wireless LAN Installations
10.7 Emerging Security Solutions
x
WEP Key Management
9.1 Multipath
x
Wireless VPNs
9.2 Troubleshooting Multipath
x
TKIP
9.3 Solutions for Multipath
x
AES Based Solutions
9.4 Hidden Node
x
Wireless Gateways
x
x
802.1x & EAP
Solutions to Hidden Node Problem
9.5 Near / Far
9.6 System throughput
10.8 Corporate Security Policy
9.7 Co-location
10.9 Security Recommendations
9.8 Types of Interference
x
Narrow band Interference
x
All band interference
x
RF Signal Degradation & Interference
11.1 What is a Site Survey?
x
Adjacent Channel & Co-Channel Interference
11.2 Preparing for a Site Survey
9.9 Range Considerations
Chapter-11 Site Survey Fundamentals
11.3 Site Survey Equipment
11.4 Conducting a Site Survey
Chapter-10 WLAN Security
11.5 Site Survey Reporting
10.1 WLAN Security
IEEE 802.16 WIMAX Technology
10.2 WEP (Wired Equivalent Privacy)
10.3 Solutions to WEP Weakness
x
WIMAX Overview
x
WEP Keys
x
Introduction to WIMAX
x
Static WEP Keys
x
How WIMAX Works
x
Centralized Key Server
x
What can WIMAX do
x
WIMAX Cost
x
WIMAX Scenario
10.4 AES (Advanced Encryption Standard)
10.5 Filtering
x
By SSID
x
By MAC Address
802.11n Overview
x
x
By Protocol
x
802.11n MIMO
x
802.11n Linksys Products
IEEE 802.11n Standard
10.6 Attacks on WLANs
x
Passive
x
Active
x
Jamming
x
Man in the Middle
www.itttc.net
Wimax & 802.11n Products
x
WLAN Scanning
x
Emerging Wireless Security Solutions
x
D-Link Range Boosters
x
VPN Solutions
x
D-Link Power over Ethernet (PoE)
x
Power Management Features
x
D-Link WIFI Phone
x
Dynamic Rate Shifting
x
D-Link VoIP Router
x
RTS / CTS
x
D-Link Wireless Router
x
Modulation
x
D-Link MIMO Devices
x
Multipath
x
Proxim WIMAX
x
Hidden Node
x
Solectek WIMAX
x
WEP
x
Passive Attacks on Wireless LANs
x
WEP Key Management
x
Site Survey Equipment
Linksys Products Demo and Wireless LAN Policy
x
Linksys Products Description
x
Linksys Products Demo
x
Configuring Wireless LAN Policy in Server 2003
CWNA Wireless LAN Labs
CWNA Additional Features
x
Wireless LAN Articles
x
CWNA Labs
x
Wireless E-Books
x
Today’s WLAN Standards
x
Linksys Products
x
Concepts of RF behavior
x
Wireless Tools (Netstumbler)
x
Comparing FHSS vs. DSSS
x
Access Point Options
x
Wireless Bridge
x
Wireless Workgroup Bridge
x
Wireless LAN client devices
x
Wireless LAN gateway devices
x
RF Antenna Types
x
PoE Devices
x
WLAN Accessories: Amplifiers
x
WLAN Accessories: Attenuators
x
WLAN Accessories: Lightening Arrestors
x
WLAN Accessories: RF Splitters
x
WLAN Accessories: RF Connectors
x
WLAN Accessories: RF Cables
x
WLAN Accessories: RF Pigtail Adapter Cable
x
WLAN Accessories: Frequency Convertors
x
WLAN Accessories: Bandwidth Control Units
x
WLAN Accessories: Test Kits
x
WLAN Organizations
www.itttc.net
www.itttc.net
Download