CCNP ISCW www.itttc.net ﺑﺮﻧﺎﻣﻪ آﻣﻮزﺷﻲ ﭘﻴﺸﻨﻬﺎدي A+ 220-601 Network+ 2009 (N10-004) CCNA 640-802 (R & S) MCSA MCSE MCSE Security 70-270 70-290 70-291 Security+ 70-293 70-294 70-298 MCITP Server Administrator MCITP Enterprise Administrator 70-640 70-642 70-646 70-620 70-640 70-642 70-643 70-647 MCITP Database Administrator 70-350 70-431 70-443 70-444 MCITP Enterprise Messaging Administrator CCNP 4 Classes ITTTC Cisco VoIP 640-460 CCNA Security 640-553 CCNA Voice CCVP 5 Classes CCSP 5 Classes 70-236 70-237 70-238 www.itttc.net ITTTC CWNA 640-721 CCNA Wireless BSCI (642-901) ONT (642-845) ISCW (642-825) BCMSN (642-812) www.itttc.net CompTIA A+ Essentials Network+ 2007 Security+ 2007 www.itttc.net www.itttc.net CompTIA 220-601 A+ Essentials Chapter-1 Personal Computer Components Chapter-6 Security 1.1 PC Components Part I 6.1 Security Part I 1.2 PC Components Part II 6.2 Security Part II 1.3 PC Components Part III 6.3 Install & Configure & Upgrade and Optimize Security 1.4 Install, Configure & Optimize PC Components Part I 6.4 Preventative Maintenance for Computer Security 1.5 Install, Configure & Optimize PC Components Part II 1.6 Identify Tools and Diagnostics for PC Components Part I 1.7 Identify Tools and Diagnostics for PC Components Part II 1.8 Performing Preventive Maintenance on PCs Chapter-7 Safety and Environmental Issues 7.1 Perform Preventative Maintenance for Computer Security Chapter-2 Laptops and Portable Devices 7.2 Hazards & Safety Procedures 7.3 Identify Disposal Procedures 2.1 Principals of Laptops and Desktop Devices 2.2 Upgrade and Optimize Laptops and Portable Devices 2.3 Identify Tools and Diagnostic Procedures 2.4 Preventative Maintenance for Laptops and Portable 8.1 Use Good Communication Skills Devices 8.2 Use Appropriate Job-Related Behavior Chapter-8 Professionalism and Communication Chapter-3 Operating Systems Appendix-A New Technologies 3.1 Operating Systems Fundamentals Animations 3.2 Installing and Configuring Operating Systems 3.3 Troubleshooting Operating Systems Part I A1 Public Key Encryption 3.4 Troubleshooting Operating Systems Part II A2 IP Addressing & Classes 3.5 Preventative Operating System Maintenance A3 Wireless LANs A4 Fiber Optic Cabling Chapter-4 Printers and Scanners A5 Disk Mirroring, Duplexing & Stripping 4.1 Printer Technologies Wireless Technologies 4.2 Scanners and Communication Types 4.3 Installing & configuring & upgrading printers and scanners A6 Wireless Networking Organizations 4.4 Troubleshooting Printers and Scanners A7 WiMax Overview A8 802.11n Overview A9 D-Link WLAN Products A10 Linksys WLAN Products A11 WLAN Security Protocols Chapter-5 Networks 5.1 Networking Fundamentals Part I 5.2 Networking Fundamentals Part II 5.3 Install & configure & optimize and upgrade networks 5.4 Troubleshooting Networks www.itttc.net Appendix-B Networking Topics Windows Vista Ultimate Lessons & Labs B1 Internetworking Overview Lab 3.1 Windows Vista Overview B2 OSI Model Lab 3.2 Getting Around Windows Vista B3 Ethernet Networks Lab 3.3 Installing Windows Vista Ultimate Edition B4 Ethernet Cabling Lab 3.4 Taskbar, Start Menu, Activation, Recycle Bin B5 Network Domains Lab 3.5 Taskbar & Start Menu & Control Panel Overview B6 Ethernet Addressing Lab 3.6 Control Panel & Disk Cleanup B7 Cisco Routers Lab 3.7 Customizing Start Menu, Searching & Windows Gadgets Lab 3.8 Event Viewer Windows XP Labs A+ 220-601 Utilities CDs Lab 1.1 Installing Windows XP SP2 Lab 1.2 System Properties x Ebooks Lab 1.3 Printing x A+ 220-601 Exam Lab 1.4 Authentication Display & Device Properties x A+ Videos Lab 1.5 Accessibility x VMWare Workstation Software Lab 1.6 Lab 1.7 Screen Effects x VMWare Workstation Software Training in Farsi Lab 1.8 Display Resolution Lab 1.9 Device Manager & Add Hardware Wizard Lab 1.10 Hardware Profiles Lab 1.11 Power Options Lab 1.12 TCP/IP Addressing & IPCONFIG Lab 1.13 Backup & Restore Lab 1.14 System Restore & Safe Mode Lab 1.15 Performance Options & Task Manager Windows Server 2003 Labs Lab 2.1 Installing Server 2003 Enterprise Edition Lab 2.2 MMC & Computer Management Console Lab 2.3 Disk Defragmenter Lab 2.4 Printing Lab 2.5 Compression & Encryption Lab 2.6 Automated System Recovery Lab 2.7 Device Manager, Hardware & Resources Lab 2.8 Automatic Updates www.itttc.net CompTIA Network+ 2007 Chapter-1 Introduction to Networking Chapter-7 Survey of Network Operating Systems 1.1 What is a Network? 7.1 Network Operating Systems 1.2 Network Configuration Overview 7.2 UNIX 1.3 Network Components 7.3 Novel Netware Integration Chapter-2 Network Communications & OSI Layers Chapter-8 Wide Area Networking 2.1 Network Communications & OSI Layers 8.1 Switching Methods 8.2 Cell Switching 8.3 Using the Digital Telephone with ISDN Chapter-3 Introduction to Server 2003 & TCP/IP 8.4 DSL 3.1 The Five Flavors of Server 2003 8.5 Cable Modem 3.2 Windows 2003 Networking Models 8.6 Using Fiber Optics with FDDI 3.3 Installation Types 8.7 Frame Relay 3.4 Network Addressing & TCP/IP 8.8 T-Carrier System 3.5 TCP/IP Addressing 8.9 SONET 3.6 TCP/IP Troubleshooting Tools 3.7 TCP/IP Subnetting Chapter-9 Network Services & Support 3.8 Network Traffic 3.9 Introduction to NAT 9.1 Name Resolution 3.10 Other TCP/IP Protocols 9.2 DHCP 9.3 WINS 9.4 DNS Chapter-4 Network Communication & Network 9.5 IP Configuration in Microsoft Windows Connectivity Devices 9.6 Network Troubleshooting 4.1 Data Communication & Signals 4.2 Modems Chapter-10 Networking with Remote Clients & Servers & 4.3 Expanding a Network Using Components Network Security Chapter-5 IEEE Standards, Physical Media, Wireless Technologies & Network Layout Design 10.1 Remote Node 10.2 Terminal Server 10.3 IPSec 5.1 IEEE Standards 10.4 VPN 5.2 Physical Media 10.5 Trust Relationships 5.3 Wireless Technologies 10.6 Firewalls 5.4 Network Layout Design Chapter-11 Network Configuration Chapter-6 Networking Architectures 11.1 VLAN 6.1 Networking Architectures (Ethernet) 11.2 Disaster Recovery 6.2 Token Ring Architecture 11.3 SOHO 6.3 AppleTalk & ArcNet www.itttc.net Chapter-12 IPv6 Overview & Cisco 3-Layer Hierarchy Chapter-18 WAN Overview, Frame Relay & ISDN 12.1 IPv6 Overview 18.1 WAN Overview 12.2 Cisco 3-Layer Hierarchy 18.2 Introduction to Frame Relay 12.3 Fast Switching vs. Process Switching 18.3 ISDN Overview 18.4 ISDN Types 18.5 ISDN Functional Groups and Reference Points Cisco CCNA & Wireless LAN Topics 18.6 ISDN Standards Chapter-13 Introduction to Cisco Internetworking 18.7 ISDN & Cisco Routers 13.1 Internetworking Chapter-19 Introduction to Wireless LANs 13.2 OSI Model 13.3 Ethernet Networks 19.1 History of Wireless LANs 13.4 Ethernet Cabling 19.2 Today's Wireless LAN Standards 13.5 Network Domains 19.3 Applications of Wireless LANs 13.6 Ethernet Addressing 19.4 Wireless Networking Standards 13.7 Cisco 3-Layer Hierarchical Model 19.5 Radio Frequency Spectrum 13.8 Ethernet Framing 19.6 FHSS vs. DSSS Chapter-14 IP Addressing, Subnetting, VLSM & NAT Windows XP Service Pack 2 Lessons 14.1 IP Addressing Overview 1. Hardware Requirements 14.2 Subnetting Overview 2. Simple File Sharing 14.3 VLSM Overview 3. User and Group Accounts 14.4 Network Address Translation 4. Configuring and Managing User Profiles 5. Hardware 6. Disk Storage Chapter-15 Static vs. Dynamic Routing & RIP 7. Configuring and Troubleshooting TCP/IP Part I 8. Windows XP Backup 15.1 Distance Vector vs. Link State Routing 15.2 RIP Windows Server 2003 Enterprise Lessons Chapter-16 Ethernet, Switch Function & Switch Types 1. Windows Server 2003 Networking Models 16.1 Ethernet Overview 2. Disk Types 16.2 Switch vs. Bridge 3. Using Saved Queries 16.3 Switch Function 4. Server 2003 Printing Terminology 16.4 Switch Function Example #1 5. Authentication 16.5 LAN Switch Types 6. Backup & Restore 7. Group Policy Chapter-17 Introduction to STP & VLANs 8. Device Manager 17.1 Spanning Tree Protocols 17.2 Introduction to VLANs www.itttc.net Windows Vista Lessons Networking Animations 1. Windows Vista Overview A1 Backbone & Segments 2. Getting Around Windows Vista A2 Bridges vs. Switches 3. Automated Help & Support A3 Physical Topologies 4. Customizing the Desktop & Interface A4 LANs, MANs & WANs 5. Installing and Maintaining Programs A5 Wireless LANs 6. Understanding User & Group Accounts A6 Fiber Optic Cabling 7. Windows Mobility Center A7 Network Cables 8. Configuring User and Computer Policies A8 Mirror Volume A9 Public Key Encryption A10 IP Spoofing A11 Proxy Server Introduction ISA Server 2004 Lessons x ISA Server Capabilities & Operation A12 DMZ (Demiliterized Zone) x ISA Server 2004 vs. other Firewall Products A13 Access Control Lists x ISA Server 2004 Lab A14 PPTT/VPN Servers A15 IP Address Classes A16 Making a Patch Cable (Steps) A17 RJ-45, AUI, Patch Panel & CAT-5 A18 Cisco Three Layer Hierarchy & Cisco Products A19 OSI Model A20 OSI Layers A21 Checking Router Cabling A22 Cisco Routers A23 TCP/IP Windowing A24 Layer-2 Switch Functionality A25 Layer-2 Switch Responsibilities Introduction to Cisco VoIP Lessons x Telephony Networks, Components & PSTN x PBX vs. Key Systems x VoIP Network Components & Advantages Cisco CCNA Router & Switch Labs CCNA-Lab-1 Basic Router Configuration CCNA-Lab-2 Routing in Two Subnets Packet Tracer Labs CCNA-Lab-3 Routing in Four Subnets CCNA-Lab-4 PC to PC Comm. using Cisco 2950 Switch CCNA-Lab-5 Configuring Cisco Discovery Protocol CCNA-Lab-6 LAN Switching using Two Cisco 2950 Switches P1 PC to PC Communication P2 Single Device: Hub P3 Single Device: Switch P4 Single Device: Router P5 Multiple Devices: Multiple Hubs P6 Multiple Devices: Multiple Switches P7 Multiple Devices: Multiple Routers P8 Mixed Environement (Hubs, Switches, Routers) www.itttc.net Windows XP Labs Network+ 2007 Utilities CD XP-1 Installing Windows XP SP2 x E-books XP-2 System Properties x Packet Tracer XP-3 Printing Authentication x NetSIM XP-4 Display & Device Properties x Subnet XP-5 XP-6 Accessibility x Wildcard Calculator XP-7 Screen Effects x Network+ Exam XP-8 Display Resolution x VMWare Workstation Software XP-9 Device Manager & Add Hardware Wizard x VMWare Workstation Software Training in Farsi XP-10 Hardware Profiles Windows Server 2003 Enterprise Labs Server-1 Installing Server 2003 Server-2 APIA & IPCONFIG Server-3 Loopback Test & PING Server-4 Administrative Tools Server-5 Event Viewer Server-6 Service Console Server-7 System Properties Server-8 Network Connection Types Windows Vista Ultimate Labs Vista-1 Installing Windows Vista Ultimate Edition Vista-2 Taskbar & Start Menu Vista-3 Password Reset Disk Vista-4 System Startup and Recovery & System Configuration Vista-5 Taskbar & Start Menu & Control Panel Vista-6 Control Panel & Disk Cleanup Vista-7 Device Manager & Performance Options Vista-8 Local Area Connection Properties & TCP/IP Configuration www.itttc.net CompTIA Security+ Chapter 1 General Networking and Security Concepts Chapter 6 Application Security 1.1 The Big Picture 6.1 E-mail Security 1.2 Identifying Threats 6.2 Web Security 1.3 Intrusion Points 6.3 File Transfer 1.4 Defending against Threats 1.5 Organizational and Operational Security Chapter 7 User Security Chapter 2 TCP/IP Basics 7.1 Understanding Authentication 7.2 Understanding Access Control Models 2.1 TCP/IP Layers and Vulnerabilities Chapter 8 Security Baselines Chapter 3 Certificate Basics 8.1 Network Device and Operating System Hardening 2.1 Understanding & Using Cryptography 8.2 Server Application Hardening 2.2 Types of Protected Integrity 2.3 Identifying the components of a Public Key Infrastructure Chapter 9 Operational Security 2.4 Certificate Authorities 2.5 Understanding Certificate Life Cycle and Key 9.1 Physical Security Management 9.2 Privilege Management 2.6 Supplement #1 & Summary 9.3 Removable Media 9.4 Protecting Business Continuity Chapter 4 Network Infrastructure Security Chapter 10 Organizational Security 4.1 Securing Network Cabling 4.2 Securing Connectivity Devices 10.1 Documentation 4.3 Firewalls 10.2 Risk Assessment 4.4 Remote Access 10.3 Security Education 4.5 Telecommunications Hacking 4.6 Wireless Network Chapter 11 Incident Detection and Response 4.7 NAT 4.8 VLAN 11.1 Attacks and Malicious Code 4.9 Protecting Mobil Devices 11.2 Intrusion Detection Systems 4.10 Implementing IDS & using Honeypots and Honeynets 11.3 Incident Response Chapter 5 Communications Security 5.1 Understanding Remote Access Connectivity 5.2 Providing Secure Remote Access 5.3 Understanding Wireless Standards and Protocols www.itttc.net Appendix-A Security Topics & Security Tools Cisco Security Topics Parts I, II, III x Robocopy.exe: Robust File Copy Utility x Rpcdump.exe: RPC Dump x Sc.exe: Service Controller Tool x Sclist.exe x Setspn.exe: Manipulate Service Principal Names for x Cisco Router Passwords x Standard IP ACLs x Extended IP ACLs x Showacls.exe x Switch CAM Table x Showpriv.exe: Show Privilege x Static MAC Address x Shutdown.exe: Remote Shutdown x Port Security for 1900/2500 series switches x Srvany.exe: Applications as Services Utility x Cisco Discovery Protocol x Srvcheck.exe x CDP Commands x Srvinfo.exe x Su.exe x Subinacl.exe x Uptime.exe x Vadump.exe: Virtual Address Dump x Whoami.exe x Xcacls.exe Accounts Server 2003 Security Topics x Server 2003 Security Settings Lab Server 2003 Resource Kit Security Tools (37 Tools) x Auditpol.exe: Audit Policy x Clearmem.exe: Clear Memory x Drivers.exe: List Loaded Drivers x Nessus x Dsstore.exe: Directory Services Store x Ethereal x Dumpel.exe: Dump Event Log x Snort x Efsinfo.exe: Encrypting File System Information x Netcat x Findgrp.exe: Find Group x TCPDump/WinDump x Getmac.exe: GetMAC x Hping2 x Getsid.exe x DSniff x Gettype.exe: Get Type Version Information x GFI LANguard x Ipsecpol.exe: Internet Protocol Security Policies Tool x Ettercap x Kerbtray.exe: Kerberos Tray x Whisker/LibWhisker x Klist.exe: Kerberos List x John the Ripper x Logoff.exe x OpenSSH / SSH x Ntrights.exe x Sam Spade x Pulist.exe x ISS Internet Scanner x Regback.exe: Registry Backup x Tripwire x Regdmp.exe x Nikto x Regfind.exe x Kismet x Regini.exe: Registry Change by Script x SuperScan x Regrest.exe: Registry Restoration x L0phtCrack 4 x Retina Internet Top 75 Security Tools www.itttc.net x Netfilter x Authentication Protocols x Fport x Encryption x SAINT x Windows Firewall x Network Stumbler x Security Under SP2 x SARA x N-Stealth x AirSnort x NBTScan x Security Framework x GnuPG /PGP x Segmenting Networks x Firewalk x Encryption Authentication x Cain & Abel x PKI x XProbe2 x Auditing x SolarWinds Toolsets x IPSec x NGrep x Securing IIS Web Sites x Perl / Python x RRAS IAS x THC-Amap x Securing Wireless Networks x OpenSSL x NTop x Nemesis x LSOF x Honeyd x Achilles x Brutus x Stunnel x User & Security Groups x Paketoo Keiretsu x Local Logon x Fragroute x Stored Passwords x Spike Proxy x Managing Local User Accounts and Groups x THC-Hydra x Managing Remote Access to Workstations x File Security and Resource Sharing x Basic/Special Permissions x File Ownership/ Inheritance ISA Server 2004 Overview Appendix-C Server 2003 Security Topics ISA Server Lab x ISA Server 2004 Overview Lab Appendix-D: Windows Vista Ultimate Security Topics x ISA Server 2004 Capabilities x Effective Permissions x ISA Server 2004 Operation x Sharing Files & Folders over the Network x Public Folder Sharing x Vista Networking Features x TCP/IP and Dual IP Stack Appendix-B Windows XP SP2 Security Topics x Authentication x Diagnosing and Resolving Problems x Security x Optimizing and Safeguarding Disk Drives x Data Compression x Windows Security Center Windows Firewall x Data Encryption x Windows Defender x Configuring & Troubleshooting TCP/IP x Automatic Updates x Task Manager x Reliability and Performance Monitor www.itttc.net 11 Categories of Shareware Security Tools Security+ Utilities CD x Crytp x E-books x Email Antispam x Freeware Security Tools x File Encryption x Windows Security Tools x File Wiping x VMWare Workstation Software x IP Address Tools x VMWare Workstation Software Training in Farsi x Network Info Tools x Security+ Exam x Network Monitoring x Networking Tools x Other Tools x Password Dictionaries x Personal Firewalls Appendix-E WLAN Security Topics x WLAN Security x WEP (Wired Equivalent Privacy) x Solutions to WEP Weaknesses x AES (Advanced Encryption Standard) x Filtering x Attacks on Wireless LANs x Emerging Security Solutions x Corporate Security Policy x Security Recommendations www.itttc.net Microsoft MCSA MCSE MCSE Security www.itttc.net www.itttc.net MCSA / MCSE 70-270 Windows XP Professional SP2 Chapter-1 Installing and Deploying Windows XP Professional 4.6 Multiple Language Support & Regional Options 4.7 Files Settings and Transfer Wizard 4.8 Accessibility Options 4.9 Advanced Video Display Options 4.10 Fax Features & Scheduled Tasks 1.1 Hardware Requirements 1.2 Upgrading to Windows XP Professional 1.3 Installation Options for Windows XP Professional 1.4 Joining a Workgroup or Domain 1.5 Using USMT and FAST Wizard 1.6 Deploying Service Packs 1.7 Automatic and Dynamic Updates 1.8 Product Activation 5.1 Hardware 1.9 Troubleshooting Failed Installation 5.2 Device Drivers, Drive Signing & using Devices 5.3 Wireless Networking Support 5.4 Video Display 5.5 Removable Storage Support 5.6 Upgrading a System from One to Two Processors Chapter-5 Installing, Configuring, and Troubleshooting Hardware Devices and Drivers Chapter-2 Establishing, Configuring, and Managing Resources 2.1 Simple File Sharing 5.7 Mobile Computing 2.2 Shared Folders 5.8 Managing Hardware Profiles 2.3 Access to Files and Folders 5.9 Power Management Support 2.4 Managing and Troubleshooting Web Server Resources 5.10 Managing Card Services 2.5 Printing Concepts Chapter-6 Implementing, Managing, and Chapter-3 Setting Up, Managing, and Troubleshooting Disk Storage Troubleshooting Security Accounts and Policies 6.1 Disk Storage 6.2 Partitions vs. Volumes 3.1 User and Group Accounts 6.3 File Systems & Disk Quotas 3.2 Authentication 6.4 Data Compression & Encryption 3.3 Managing Domain User Accounts 3.4 GPO and RSoP 3.5 Security Chapter-7 Implementing, Managing, and Troubleshooting Network Protocols and Services Chapter-4 Implementing and Managing User and Desktop Settings 7.1 Configuring and Troubleshooting TCP/IP Part I 7.2 Configuring and Troubleshooting TCP/IP Part II 4.1 Configuring and Managing User Profiles 7.3 Novel Netware & UNIX Connectivity 4.2 Using Offline Files 7.4 Network Bridging 4.3 Configuring & Troubleshooting Desktop Settings 7.5 Windows Messenger 4.4 Troubleshooting and System Settings 7.6 Remote Desktop & Remote Assistance 4.5 Windows Installer Service www.itttc.net Chapter-8 System Monitoring, Performance Chapter-3 Labs Optimization, and Recovery Features Lab 3.1 User and Group Accounts 8.1 Windows XP Backup Lab 3.2 Authentication 8.2 Volume Shadow Copy Technology Lab 3.3 Managing Domain User Accounts 8.3 Troubleshooting and Repairing Windows XP Lab 3.4 GPO and RSoP Professional Systems Lab 3.5 Security 8.4 Measuring and Managing Performance 8.5 Task Manager & Monitoring Event Logs Chapter-4 Labs Lab 4.1 Configuring and Managing User Profiles Chapter-9 Installing, Administering, and Troubleshooting Remote Access Services Lab 4.2 Using Offline Files Lab 4.3 Configuring & Troubleshooting Desktop Settings 9.1 Authentication Protocols Lab 4.6 Multiple Language Support & Regional Options 9.2 Encryption Lab 4.7 Files Settings and Transfer Wizard 9.3 Connecting to Remote Access Servers Lab 4.8 Accessibility Options 9.4 Configuring Windows Firewall Lab 4.9 Advanced Video Display Options 9.5 Configuring and Troubleshooting ICS 9.6 Security Under SP2 Chapter-5 Labs Lab 5.1 Hardware Lab 5.2 Device Drivers, Drive Signing & using Devices Windows XP Professional SP2 Labs Lab 5.3 Wireless Networking Support Lab 5.4 Video Display Chapter-1 Labs Lab 5.8 Managing Hardware Profiles Lab 1.3 Installation Options for Windows XP Professional Lab 5.9 Power Management Support Lab 1.4 Joining a Workgroup or Domain Lab 1.5 Using USMT and FAST Wizard Chapter-6 Labs Lab 1.7 Automatic and Dynamic Updates Lab 6.1 Disk Storage Chapter-2 Labs Lab 6.2 Partitions vs. Volumes Lab 6.3 File Systems & Disk Quotas Lab 2.1 Simple File Sharing Lab 6.4 Data Compression & Encryption Lab 2.2 Shared Folders Lab 2.3 Access to Files and Folders Chapter-7 Labs Lab 2.4 Managing and Troubleshooting Web Server Resources Lab 2.5 Printing Concepts Lab 7.2 Configuring and Troubleshooting TCP/IP Part II Lab 7.5 Windows Messenger Lab 7.6 Remote Desktop & Remote Assistance www.itttc.net Chapter-8 Labs 70-270 Additional Features x E-book Lab 8.1 Windows XP Backup x 70-270 Exam Lab 8.2 Volume Shadow Copy Technology x Tool: USMT 3.0 Lab 8.3 Troubleshooting and Repairing Windows XP Professional Systems Lab 8.4 Measuring and Managing Performance ITTTC Utilities CD Lab 8.5 Task Manager & Monitoring Event Logs x Windows Vista Ultimate Lessons and Lab x VMWare Workstation Software x VMWare Workstation Software Training in Farsi Lab 9.1 Authentication Protocols x Windows XP Service Pack 3 Information Lab 9.2 Encryption x Windows XP Animations Chapter-9 Labs Lab 9.3 Connecting to Remote Access Servers Lab 9.4 Configuring Windows Firewall Lab 9.5 Configuring and Troubleshooting ICS Lab 9.6 Security Under SP2 www.itttc.net www.itttc.net MCSA / MCSE 70-290 Server 2003 Environment Management and Maintenance Chapter-1 Introduction to Windows Server 2003 & 4.9 Managing printing from the command line Active Directory Chapter-5 Windows 2003 Security 1.1 Windows 2003 Networking Models 5.1 Authentication 1.2 Installation Types 5.2 Cryptography 1.3 What is a Directory? Active Directory 5.3 Encrypting File System (EFS) 1.4 MMC 5.4 Security Configuration Tools 1.5 Administrating User Accounts 5.5 Auditing in Server 2003 1.6 Server 2003 Groups 1.7 User Profiles 1.8 Account Policies Chapter-6 Backup and Restore & Managing Data Storage Chapter-2 Server 2003 File System, Disks Shared Folders, NTFS Permissions 6.1 Backup & Restore 6.2 ASR 6.3 Shadow Copies of Shared Folders 2.1 Disk Types 6.4 NTFS Compression 2.2 Windows 2003 File Systems 6.5 Disk Quota 2.3 Using NTFS Mounted Drives 2.4 Shared Folders Chapter-7 Group Policy 2.5 NTFS Permissions 2.6 NTFS Partitions 7.1 What is Group Policy? 2.7 Disk Defragmenter 7.2 SW Deployment Methods using Group Policy 2.8 Disk Management Commands 7.3 RSoP (Resultant Set of Policy) 7.4 Group Policy Management Console (GPMC) Chapter-3 Active Directory Part II Chapter-8 Devices, Drivers, Automatic Updates & 3.1 Saved Queries Software Update Service 3.2 Active Directory Command Line Tools 3.3 Operations Master Roles 8.1 Device Manager 8.2 Driver Signing Chapter-4 Setting up and Configuring Printers in Server 2003 4.1 Server 2003 Printing Terminology 8.3 System Update Features 8.4 Software Update Services Chapter-9 Administrative Tools Remote Desktop & 4.2 Network Printing Requirements System Monitor Performance Logs & Alerts 4.3 Guidelines for Network Printing 4.4 Adding other types of printers 4.5 Internet Printing 4.6 Configuring Network Printers 4.7 Print Spooler 9.1 Server 2003 Tools 9.2 Remote Connections 9.3 System Monitor & Performance Logs & Alerts 9.4 Tuning System Performance 4.8 Printer Administration www.itttc.net Chapter-10 Domains/Forests Functional Levels & Chapter-3 Labs IIS 6.0 Lab 3.1 Saved Queries 10.1 Domain & Forest Functional Levels Lab 3.2 Active Directory Command Line Tools 10.2 IIS 6.0 Lab 3.3 Operations Master Roles 10.3 FTP Chapter-4 Labs Chapter-11 Terminal Services Lab 4.4 Adding other types of printers 11.1 Terminal Services Overview Lab 4.5 Internet Printing 11.2 Terminal Services Benefits Lab 4.6 Configuring Network Printers 11.3 Using Terminal Server to host applications centrally Lab 4.7 Print Spooler 11.4 Terminal Services Administrative Tools Lab 4.8 Printer Administration 11.5 Managing TS from the Command Line Lab 4.9 Managing printing from the command line 11.6 TS Client Overview 11.7 TS Client Features Chapter-5 Labs 11.8 TS Licensing Overview 11.9 TS Licensing Modes Lab 5.1 Authentication 11.10 TS Troubleshooting Lab 5.2 Cryptography Lab 5.3 Encrypting File System (EFS) 70-290 Server 2003 Environment Labs Lab 5.4 Security Configuration Tools Lab 5.5 Auditing in Server 2003 Chapter-1 Labs Chapter-6 Labs Lab 1.1 Windows 2003 Networking Models Lab 1.2 Installation Types Lab 6.1 Backup & Restore Lab 1.3 What is a Directory? Active Directory Lab 6.2 ASR Lab 1.4 MMC Lab 6.3 Shadow Copies of Shared Folders Lab 1.5 Administrating User Accounts Lab 6.4 NTFS Compression Lab 1.6 Server 2003 Groups Lab 6.5 Disk Quota Lab 1.7 User Profiles Lab 1.8 Account Policies Chapter-7 Labs Chapter-2 Labs Lab 7.1 What is Group Policy? Lab 7.2 SW Deployment Methods using Group Policy Lab 2.1 Disk Types Lab 2.3 Using NTFS Mounted Drives Lab 7.3 RSoP (Resultant Set of Policy) Lab 7.4 Group Policy Management Console (GPMC) Lab 2.4 Shared Folders Lab 2.5 NTFS Permissions Lab 2.7 Disk Defragmenter Lab 2.8 Disk Management Commands www.itttc.net Chapter-8 Labs 70-290 Additional Features x E-book Lab 8.1 Device Manager x 70-290 Exam Lab 8.2 Driver Signing x Tools Lab 8.3 System Update Features Lab 8.4 Software Update Services ITTTC Utilities CD Chapter-9 Labs Lab 9.1 Server 2003 Tools Lab 9.2 Remote Connections Lab 9.3 System Monitor & Performance Logs & Alerts Lab 9.4 Tuning System Performance x Windows Vista Ultimate Lessons and Lab x VMWare Workstation Software x VMWare Workstation Software Training in Farsi x Windows XP Service Pack 3 Information x Windows XP Animations Chapter-10 Labs Lab 10.1 Domain & Forest Functional Levels Lab 10.2 IIS 6.0 Lab 10.3 FTP Chapter-11 Labs Lab 11.3 Using Terminal Server to host applications centrally Lab 11.4 Terminal Services Administrative Tools Lab 11.5 Managing TS from the Command Line Lab 11.7 TS Client Features Lab 11.9 TS Licensing Modes www.itttc.net www.itttc.net MCSA / MCSE 70-291 Server 2003 Network Infrastructure I Chapter-1 Understanding Server 2003 Networks Chapter-7 Configuring DHCP Servers & Clients 1.1 Understanding Network Infrastructures 7.1 Introducing DHCP 1.2 Networking with Default Components in Server 2003 7.2 DHCP Terminology 1.3 Extending a Server 2003 Network Infrastructure 7.3 DHCP Options 7.4 DHCP Database Chapter-2 Understanding TCP/IP 7.5 Configuring DHCP Relay 7.6 Managing DHCP 2.1 Understanding TCP/IP 7.7 Managing DHCP Database 2.2 Understanding IP Addressing 7.8 DHCP Option Classes 2.3 Subnetting & Supernetting IP Networks 7.9 Configuring DHCP Servers to Perform DNS Updates 2.4 Installing & Configuring TCP/IP Chapter-8 Monitoring & Troubleshooting DHCP Chapter-3 Monitoring & Troubleshooting TCP/IP Connections 8.1 DHCP Messages 8.2 Monitoring DHCP Through Audit Logging 3.1 Analyzing Traffic using Network Monitor 8.3 DHCP Performance Monitoring 3.2 Troubleshooting TCP/IP Connections 8.4 Troubleshooting DHCP Chapter-4 Configuring DNS Servers & Clients Chapter-9 Routing with Server 2003 4.1 Understanding Name Resolution in Server 2003 9.1 Configuring Windows Server 2003 for LAN Routing 4.2 Understanding DNS in Server 2003 Networks 9.2 Configuring RRAS 4.3 Deploying DNS Servers 9.3 Configuring Demand-Dial Routing 4.4 Deploying DNS Clients 9.4 Example of Configuring Demand-Dial Routing 9.5 NETSH Commands for RAS 9.6 Configuring NAT Part 1 9.7 Configuring NAT Part 2 5.1 Configuring DNS Server Properties 9.8 Internet Connection Sharing 5.2 Configuring Zone Properties & Transfers 9.9 Configuring and Managing Routing Protocols 5.3 Configuring Advanced DNS Server Properties 9.10 RIP for IP Security 5.4 Creating Zone Delegations 9.11 Configuring RIP for IP Router 5.5 Deploying Stub Zones 9.12 OSPF Chapter-5 Implementing a DNS Infrastructure 9.13 Configuring Packet Filters Chapter-6 Monitoring & Troubleshooting DNS Chapter-10 Configuring and Managing Remote Access 6.1 Using DNS Troubleshooting Tools 6.2 Using DNS Monitoring Tools 10.1 Configuring Remote Access Connections 10.2 Authorizing Remote Access Connections 10.3 Implementing VPNs 12.1 Introduction to IAS www.itttc.net 10.4 Installing and Configuring the IAS Chapter-4 Labs 10.5 Configuring RRAS and IAS 10.6 Configuring IAS Lab 4.3 Deploying DNS Servers Lab 4.4 Deploying DNS Clients Chapter-11 Managing Network Security Chapter-5 Labs 11.1 Introduction to Security Protocols & Security Templates 11.2 IPSec and Levels of Security Lab 5.1 Configuring DNS Server Properties 11.3 IPSec Rules Lab 5.2 Configuring Zone Properties & Transfers 11.4 Checking IPSec Functionality Lab 5.3 Configuring Advanced DNS Server Properties 11.5 IPSec Security Protocols & Modes of Operation Lab 5.4 Creating Zone Delegations 11.6 IPSec Components Lab 5.5 Deploying Stub Zones 11.7 IPSec Phases of Operation 11.8 Description of IPSec Policy 11.9 IPSec Tools 11.10 Troubleshooting Network Protocol Security Chapter-6 Labs Lab 6.1 Using DNS Troubleshooting Tools Lab 6.2 Using DNS Monitoring Tools Chapter-12 Maintaining a Network Infrastructure Chapter-7 Labs 12.2 Monitoring Network Performance 12.3 Troubleshooting Internet Connectivity Lab 7.3 DHCP Options 12.4 Troubleshooting Server Services Lab 7.4 DHCP Database Lab 7.5 Configuring DHCP Relay 70-291 Server 2003 Network Infrastructure I Labs Lab 7.6 Managing DHCP Lab 7.7 Managing DHCP Database Lab 7.8 DHCP Option Classes Chapter-1 Labs Lab 7.9 Configuring DHCP Servers to Perform DNS Updates Lab 1.2 Networking with Default Components in Server 2003 Lab 1.3 Extending a Server 2003 Network Infrastructure Chapter-8 Monitoring & Troubleshooting DHCP Lab 8.2 Monitoring DHCP Through Audit Logging Chapter-2 Labs Lab 8.3 DHCP Performance Monitoring Lab 8.4 Troubleshooting DHCP Lab 2.3 Subnetting & Supernetting IP Networks Lab 2.4 Installing & Configuring TCP/IP Chapter-3 Labs Lab 3.1 Analyzing Traffic using Network Monitor Lab 3.2 Troubleshooting TCP/IP Connections Chapter-9 Routing with Server 2003 Lab 9.2 Configuring RRAS Lab 9.3 Configuring Demand-Dial Routing Lab 9.5 NETSH Commands for RAS Lab 9.7 Configuring NAT Part 2 Lab 9.8 Internet Connection Sharing Lab 9.9 Configuring and Managing Routing Protocols Lab 9.11 Configuring RIP for IP Router Lab 9.13 Configuring Packet Filters www.itttc.net Chapter-10 Configuring and Managing Remote Access Lab 10.1 Configuring Remote Access Connections 70-291 Additional Features x E-books & MOC x 70-291 Exam Lab 10.2 Authorizing Remote Access Connections Lab 10.3 Implementing VPNs Lab 10.6 Configuring RRAS and IAS Lab 10.7 Configuring IAS Chapter-11 Managing Network Security Lab 11.1 Introduction to Security Protocols & Security ITTTC Utilities CD x Windows Vista Ultimate Lessons and Lab x VMWare Workstation Software x VMWare Workstation Software Training in Farsi x Windows XP Service Pack 3 Information x Windows XP Animations Templates Lab 11.4 Checking IPSec Functionality Lab 11.6 IPSec Components Lab 11.9 IPSec Tools Chapter-12 Maintaining a Network Infrastructure Lab 12.1 Monitoring Network Performance Lab 12.2 Troubleshooting Internet Connectivity Lab 12.3 Troubleshooting Server Services www.itttc.net www.itttc.net CompTIA Security+ Chapter 1 General Networking and Security Concepts Chapter 6 Application Security 1.1 The Big Picture 6.1 E-mail Security 1.2 Identifying Threats 6.2 Web Security 1.3 Intrusion Points 6.3 File Transfer 1.4 Defending against Threats 1.5 Organizational and Operational Security Chapter 7 User Security Chapter 2 TCP/IP Basics 7.1 Understanding Authentication 7.2 Understanding Access Control Models 2.1 TCP/IP Layers and Vulnerabilities Chapter 8 Security Baselines Chapter 3 Certificate Basics 8.1 Network Device and Operating System Hardening 2.1 Understanding & Using Cryptography 8.2 Server Application Hardening 2.2 Types of Protected Integrity 2.3 Identifying the components of a Public Key Infrastructure Chapter 9 Operational Security 2.4 Certificate Authorities 2.5 Understanding Certificate Life Cycle and Key 9.1 Physical Security Management 9.2 Privilege Management 2.6 Supplement #1 & Summary 9.3 Removable Media 9.4 Protecting Business Continuity Chapter 4 Network Infrastructure Security Chapter 10 Organizational Security 4.1 Securing Network Cabling 4.2 Securing Connectivity Devices 10.1 Documentation 4.3 Firewalls 10.2 Risk Assessment 4.4 Remote Access 10.3 Security Education 4.5 Telecommunications Hacking 4.6 Wireless Network Chapter 11 Incident Detection and Response 4.7 NAT 4.8 VLAN 11.1 Attacks and Malicious Code 4.9 Protecting Mobil Devices 11.2 Intrusion Detection Systems 4.10 Implementing IDS & using Honeypots and Honeynets 11.3 Incident Response Chapter 5 Communications Security 5.1 Understanding Remote Access Connectivity 5.2 Providing Secure Remote Access 5.3 Understanding Wireless Standards and Protocols www.itttc.net Appendix-A Security Topics & Security Tools Cisco Security Topics Parts I, II, III x Robocopy.exe: Robust File Copy Utility x Rpcdump.exe: RPC Dump x Sc.exe: Service Controller Tool x Sclist.exe x Setspn.exe: Manipulate Service Principal Names for x Cisco Router Passwords x Standard IP ACLs x Extended IP ACLs x Showacls.exe x Switch CAM Table x Showpriv.exe: Show Privilege x Static MAC Address x Shutdown.exe: Remote Shutdown x Port Security for 1900/2500 series switches x Srvany.exe: Applications as Services Utility x Cisco Discovery Protocol x Srvcheck.exe x CDP Commands x Srvinfo.exe x Su.exe x Subinacl.exe x Uptime.exe x Vadump.exe: Virtual Address Dump x Whoami.exe x Xcacls.exe Accounts Server 2003 Security Topics x Server 2003 Security Settings Lab Server 2003 Resource Kit Security Tools (37 Tools) x Auditpol.exe: Audit Policy x Clearmem.exe: Clear Memory x Drivers.exe: List Loaded Drivers x Nessus x Dsstore.exe: Directory Services Store x Ethereal x Dumpel.exe: Dump Event Log x Snort x Efsinfo.exe: Encrypting File System Information x Netcat x Findgrp.exe: Find Group x TCPDump/WinDump x Getmac.exe: GetMAC x Hping2 x Getsid.exe x DSniff x Gettype.exe: Get Type Version Information x GFI LANguard x Ipsecpol.exe: Internet Protocol Security Policies Tool x Ettercap x Kerbtray.exe: Kerberos Tray x Whisker/LibWhisker x Klist.exe: Kerberos List x John the Ripper x Logoff.exe x OpenSSH / SSH x Ntrights.exe x Sam Spade x Pulist.exe x ISS Internet Scanner x Regback.exe: Registry Backup x Tripwire x Regdmp.exe x Nikto x Regfind.exe x Kismet x Regini.exe: Registry Change by Script x SuperScan x Regrest.exe: Registry Restoration x L0phtCrack 4 x Retina Internet Top 75 Security Tools www.itttc.net x Netfilter x Authentication Protocols x Fport x Encryption x SAINT x Windows Firewall x Network Stumbler x Security Under SP2 x SARA x N-Stealth x AirSnort x NBTScan x Security Framework x GnuPG /PGP x Segmenting Networks x Firewalk x Encryption Authentication x Cain & Abel x PKI x XProbe2 x Auditing x SolarWinds Toolsets x IPSec x NGrep x Securing IIS Web Sites x Perl / Python x RRAS IAS x THC-Amap x Securing Wireless Networks x OpenSSL x NTop x Nemesis x LSOF x Honeyd x Achilles x Brutus x Stunnel x User & Security Groups x Paketoo Keiretsu x Local Logon x Fragroute x Stored Passwords x Spike Proxy x Managing Local User Accounts and Groups x THC-Hydra x Managing Remote Access to Workstations x File Security and Resource Sharing x Basic/Special Permissions x File Ownership/ Inheritance ISA Server 2004 Overview Appendix-C Server 2003 Security Topics ISA Server Lab x ISA Server 2004 Overview Lab Appendix-D: Windows Vista Ultimate Security Topics x ISA Server 2004 Capabilities x Effective Permissions x ISA Server 2004 Operation x Sharing Files & Folders over the Network x Public Folder Sharing x Vista Networking Features x TCP/IP and Dual IP Stack Appendix-B Windows XP SP2 Security Topics x Authentication x Diagnosing and Resolving Problems x Security x Optimizing and Safeguarding Disk Drives x Data Compression x Windows Security Center Windows Firewall x Data Encryption x Windows Defender x Configuring & Troubleshooting TCP/IP x Automatic Updates x Task Manager x Reliability and Performance Monitor www.itttc.net 11 Categories of Shareware Security Tools Security+ Utilities CD x Crytp x E-books x Email Antispam x Freeware Security Tools x File Encryption x Windows Security Tools x File Wiping x VMWare Workstation Software x IP Address Tools x VMWare Workstation Software Training in Farsi x Network Info Tools x Security+ Exam x Network Monitoring x Networking Tools x Other Tools x Password Dictionaries x Personal Firewalls Appendix-E WLAN Security Topics x WLAN Security x WEP (Wired Equivalent Privacy) x Solutions to WEP Weaknesses x AES (Advanced Encryption Standard) x Filtering x Attacks on Wireless LANs x Emerging Security Solutions x Corporate Security Policy x Security Recommendations www.itttc.net MCSE 70-293 Planning and Maintaining a Server 2003 Network Infrastructure II Chapter-1 Planning and Implementing Server Roles Chapter-5 Planning, Implementing, and Maintaining and Server Security Network Security and Infrastructure 1.1 OS Selection: Client & Server 5.1 Configuring Port and Protocol Security 1.2 Default Security Settings 5.2 IPSec Policy 1.3 Security Configuration & Security Templates 5.3 Remote Desktop and Remote Assistance 1.4 Configuring Server Role Based Security 5.4 Planning Security for Wireless Networks 5.5 Troubleshooting IPSec 5.6 Planning a Security Update Infrastructure 5.7 Configuring PKI that uses Certificate Services 5.8 Using Smart Card for Authentication 5.9 Configuring Certificate Services Chapter-2 Planning, Implementing, and Maintaining a Network Infrastructure 2.1 Network Topology, Infrastructure & Protocols 2.2 Planning the Physical Placement of Network Resources 2.3 IP Addressing, IP Routing and IP Subnetting 2.4 Planning an Internet Connectivity Strategy 2.5 Understanding Bandwidth Requirements 2.6 Choosing an Internet Access Solution 2.7 Client Configuration and Name Resolution 2.8 Resolving LAN/WAN Problems 2.9 Planning Name Resolution (DNS & NetBIOS) 70-293 Labs Chapter-1 Labs Lab 1.2 Default Security Settings Lab 1.4 Configuring Server Role Based Security Chapter-2 Labs Chapter-3 Planning, Implementing, and Maintaining Lab 2.2 Planning the Physical Placement of Network Routing and Remote Access Resources Lab 2.4 Planning an Internet Connectivity Strategy 3.1 Routing Protocols and Routing Topologies 3.2 Static and Dynamic Routing Protocols 3.3 IP Multicast Routing 3.4 Dial-in Tab Security 3.5 RAS Client Authentication 3.6 Remote Access Policies Lab 2.5 Understanding Bandwidth Requirements Lab 2.8 Resolving LAN/WAN Problems Chapter-3 Labs Lab 3.3 IP Multicast Routing Lab 3.4 Dial-in Tab Security Chapter-4 Planning, Implementing, and Maintaining Server Availability Lab 3.5 RAS Client Authentication Lab 3.6 Remote Access Policies 4.1 Server Avaiility & High Avaiility 4.2 Network Load Balancing & Implementing NLB 4.3 Clustering Services & Implementing Clustering Service Lab 4.2 Network Load Balancing & Implementing NLB 4.4 Backup & Recover Strategy Lab 4.3 Clustering Services & Implementing Clustering Service Chapter-4 Labs www.itttc.net Chapter-5 Labs 70-293 Server 2003 Review Labs Lab 5.4 Planning Security for Wireless Networks 1. Configuring Windows Components Lab 5.7 Configuring PKI that uses Certificate Services 2. Configuring TCP/IP Filtering and using NETSH Lab 5.9 Configuring Certificate Services 3. Configuring DHCP Service 4. Configuring DNS Service 70-293 Scenarios 5. Configuring and Removing Active Directory 6. Configuring Group Policy and RSoP Chapter-1 Scenarios 7. Configuring Network Connections 8. Configuring Routing and Remove Access Server S1.1 OS Selection: Client & Server 9. Configuring Demand Dial Interface S1.3 Security Configuration & Security Templates 10. Configuring RIP and OSPF Routing Protocols 11. Configuring RADIUS Client and Server Chapter-2 Scenarios 12. Configuring Packet Filtering 13. Configuring IP Security S2.1 Network Topology, Infrastructure & Protocols S2.3 IP Addressing, IP Routing and IP Subnetting S2.6 Choosing an Internet Access Solution S2.7 Client Configuration and Name Resolution x E-books S2.9 Planning Name Resolution (DNS & NetBIOS) x 70-293 Exam 70-293 Additional Features Chapter-3 Scenarios S3.1 Routing Protocols and Routing Topologies S3.2 Static and Dynamic Routing Protocols Chapter-4 Scenarios ITTTC Utilities CD x Windows Vista Ultimate Lessons and Lab x VMWare Workstation Software x VMWare Workstation Software Training in Farsi S4.1 Server Availability & High Availability x Windows XP Service Pack 3 Information S4.4 Backup & Recover Strategy x Windows XP Animations Chapter-5 Scenarios S5.1 Configuring Port and Protocol Security S5.2 IPSec Policy S5.3 Remote Desktop and Remote Assistance www.itttc.net MCSE 70-294 Planning, Implementing & Maintaining Server 2003 Active Directory Chapter-1 Introduction to Active Directory 5.3 Configuring Intersite Replication 5.4 Configuring Global Catalog Servers 1.1 Introduction to Active Directory 5.5 Configuring Application Directory Partitions 1.2 Active Directory Logical and Physical Structures 5.6 Monitoring and Troubleshooting Replication 1.3 Active Directory Data Store 1.4 Trust Relationships 1.5 Group Policy Overview 1.6 Active Directory Object Naming 6. 1 Understanding OUs 1.7 AD Design Process 6. 2 Creating and Administering an OU Structure 1.8 ADsPaths Chapter-6 Implementing OU Structure Chapter-7 Administering User Accounts Chapter-2 Installing & Configuring Active Directory 7.1 Understanding User Accounts 2.1 Preparing for Active Directory Installation 7.2 Creating User Accounts 2.2 Installing and Removing Active Directory 7.3 Managing User Profiles and Home Folders 2.3 Verifying Active Directory Installation 7.4 Maintaining User Accounts 2.4 Troubleshooting Active Directory Installation and Removal Chapter-8 Administering Groups Chapter-3 Administering Active Directory 8.1 Understanding Groups 3.1 Using Active Directory Administration Tools 8.2 Creating and Administering Groups & Administration 3.2 Domain & Forest Functional Levels Strategies 3.3 UPN Suffixes 3.4 Backing up Active Directory Chapter-9 Administering AD Objects 3.5 Restoring Active Directory 3.6 Miscellaneous 9.1 Locating AD Objects 9.2 Controlling Access to AD Objects Chapter-4 Installing & Managing Domains, Trees & Forests 9.3 Delegating Administrative Control of AD Objects 4.1 Creating Multiple Domains, Trees, and Forests Chapter-10 Implementing Group Policy 4.2 Renaming and Restructuring Domains and Renaming DCs 4.3 Managing Operations Master Roles 10.1 Understanding Group Policy 4.4 Managing Trust Relationships 10.2 Group Policy Planning Strategies 10.3 Implementing a GPO Chapter-5 Configuring Sites & Managing Replication Chapter-11 Administering Group Policy 5.1 Understanding Sites and Replication 5.2 Configuring Sites 11.1 Managing Group Policy with RSoP 11.2 Managing Special Folders with Group Policy 11.3 Troubleshooting Group Policy www.itttc.net Chapter-12 Deploying Software with Group Policy Chapter-4 Labs 12.1 Understanding Software Deployment with Group Policy 4.1 Creating Multiple Domains, Trees, and Forests 12.2 Deploying Software with Group Policy 4.2 Renaming and Restructuring Domains and Renaming DCs 12.3 Maintaining Software Deployed with Group Policy 4.3 Managing Operations Master Roles 12.4 Troubleshooting Software Deployed with Group Policy 4.4 Managing Trust Relationships Chapter-13 Administering Security with Group Policy Chapter-5 Lab 13.1 Understanding AD Security 5.2 Configuring Sites 13.2 Implementing Software Restriction Policies 5.3 Configuring Intersite Replication 13.3 Implementing an Audit Policy & Administering the 5.4 Configuring Global Catalogs 5.6 Monitoring and Troubleshooting Replication Security Log 13.4 Using Security Templates 13.5 Using Security Configuration And Analysis Chapter-6 Lab Chapter-14 Managing AD Performance 6. 2 Creating and Administering an OU Structure 14.1 Monitoring Performance with Service Logs and System Chapter-7 Labs Monitor 14.2 Monitoring Performance with Performance Logs And Alerts 7.2 Creating User Accounts 7.3 Managing User Profiles and Home Folders 14.3 Optimizing and Troubleshooting AD Performance Chapter-8 Labs 70-294 Active Directory Labs 8.2 Creating and Administering Groups & Administration Strategies Chapter-2 Labs Chapter-9 Labs 2.2 Installing and Removing Active Directory 2.3 Verifying Active Directory Installation 2.4 Troubleshooting Active Directory Installation and Removal 9.1 Locating AD Objects 9.2 Controlling Access to AD Objects Chapter-3 Labs 9.3 Delegating Administrative Control of AD Objects 3.1 Using Active Directory Administration Tools Chapter-10 Labs 3.2 Backing Up Active Directory 3.3 Restoring Active Directory 10.1 Understanding Group Policy 3.4 Domain & Forest Functional Levels 10.2 Group Policy Planning Strategies 3.5 UPN Suffixes 10.3 Implementing a GPO 3.6 Backing up AD www.itttc.net 70-294 Additional Features Chapter-11 Labs 11.1 Managing Group Policy with RSoP x E-books x 70-294 Exam 11.2 Managing Special Folders with Group Policy 11.3 Troubleshooting Group Policy ITTTC Utilities CD Chapter-12 Labs 12.2 Deploying Software with Group Policy Chapter-13 Labs x Windows Vista Ultimate Lessons and Lab x VMWare Workstation Software x VMWare Workstation Software Training in Farsi x Windows XP Service Pack 3 Information x Windows XP Animations 13.2 Implementing Software Restriction Policies 13.3 Implementing an Audit Policy & Administering the Security Log 13.4 Using Security Templates 13.5 Using Security Configuration And Analysis Chapter-14 Labs 14.1 Monitoring Performance with Service Logs and System Monitor 14.2 Monitoring Performance with Performance Logs And Alerts www.itttc.net www.itttc.net MCSE 70-298 Designing Security for Microsoft Windows Server 2003 Network Chapter-1 General Network Security Framework Chapter-6 Data Access Control Strategies 1.1 Security Policy 6.1 Windows Security Permissions 1.2 Segmenting Networks 6.2 Encrypting File System 1.3 Encryption 1.4 Authentication 1.5 Public Key Infrastructure 1.6 Audit Server 2003 Security Labs Lab-1 Preventing Automatic Installation of New Hardware Drivers Chapter-2 Security Infrastructure Technologies Lab-2 Protecting Against Modified Device Drivers Lab-3 Encrypting the SAM 2.1 Securing Infrastructure Server Lab-4 Enabling SYN Flood Protection 2.2 Certificate Services Lab-5 Disabling Router Discovery 2.3 Patch Management Lab-6 Configuring a Recovery Agent 2.4 Remote Administration Tools Lab-7 Changing Encryption Algorithms 2.5 Terminal Services Lab-8 Configuring Time Synchronization Settings 2.6 Windows Trust Models Lab-9 Configuring Service Parameters Lab-10 Disabling LM Hash Storage Lab-11 Requiring NTLM Authentication Lab-12 Signing LDAP Communications Chapter-3 Securing Network Communications 3.1 IP Security Lab-13 Restricting Remote Access to the Registry 3.2 Securing IIS Web Sites Lab-14 Disabling Internet Printing 3.3 Routing and Remote Access Service Lab-15 Configuring HTTP Authentication 3.4 Internet Authentication Service Lab-16 Configuring FTP Authentication 3.5 Securing Wireless Networks Lab-17 Configuring Trusted Certification Authorities Lab-18 Using Preshared Keys Lab-19 Configuring Session Encryption Lab-20 Requiring a Password for Connection Chapter-4 Secure Active Directory Design 4.1 Secure Active Director Design Lab-21 Allowing Silent Session Monitoring 4.2 Active Directory Delegation Lab-22 Restricting Access to the CA 4.3 Group Design Lab-23 Shutting Down Windows When Unable to Log Events Chapter-5 Client Hardening 5.1 GPO Application Order 5.2 Popularly Tested GPO Settings 5.3 Security Templates 5.4 Windows Firewall and Legacy Clients Lab-24 Finding More Information about an Event Lab-25 Disabling Windows Update www.itttc.net 70-298 Additional Features Case Studies x E-books, Checklists, Security Templates 1. OmniPresence x 70-298 Exam 2. GeoTrek x Windows Security Resource Kit 3. VisionWorx x RK Tools for Server 2003 4. GlobeComm 5. DreamSuites ITTTC Utilities CD 6. TeleSoft 7. CredTech Review Labs Lab-1 DNS Lab-2 Group Policy Lab-3 RADIUS Clients and Servers Lab-4 Inbound and Outbound Filters Lab-5 Security Settings x Windows Vista Ultimate Lessons and Lab x VMWare Workstation Software x VMWare Workstation Software Training in Farsi x Windows XP Service Pack 3 Information x Windows XP Animations Microsoft Security Web Site Appendix-A Windows Server 2003 RK Security Tools (50 Tools) www.itttc.net MCSE 70-350 Microsoft Internet Security and Acceleration Server 2004/2006 Chapter 0 ISA Server 2004 ON-LINE HELP Chapter 7 Configuring ISA Server Firewall Policy 0.1 ISA Server 2004 ON-LINE HELP 7.1 Configuring ISA Server Firewall Policy 0.2 ISA Server 2004 Web Site 7.2 System Policy 7.3 Overview of Firewall Policy 7.4 Access Rules 7.5 Web & Server Publishing 7.6 Troubleshooting FW Policy Chapter 1 ISA Server 2004 Overview 1.1 ISA Server Capabilities & Operation 1.2 ISA Server 2004 Editions and System Requirements 1.3 ISA Server Tools and Remote Administration 1.4 ISA Server as a Firewall 1.5 Comparing ISA 2004 to Other Firewall Products 8.1 Multinetworking Overview 1.6 ISA Server Deployment Scenarios 8.2 Working with Network Templates 8.3 Networks & Network Sets & Network Rules 8.4 Web & Firewall Chaining Chapter 8 Configuring Multinetworking Chapter 2 Installing and Configuring ISA Server 2004 Standard Chapter 9 2.1 Installing & Configuring ISA Server 2004 Std. Edition 2.2 Understanding Caching Concepts ISA Server Security and Administration 9.1 Overview 9.2 Security Policy Administration Chapter 3 ISA Server 2004 Clients Chapter 10 Securing VPN Access 3.1 Overview of ISA Server 2004 Client Types 3.2 ISA Server 2004 Client Types 10.1 Securing VPN Access 3.3 Using Infrastructure Servers 10.2 Site to Site VPN Configuration 10.3 VPN Quarantine Chapter 4 Upgrading from ISA Server 2000 Chapter 11 4.1 Upgrading ISA Server 2004 4.2 Troubleshooting ISA Server Upgrades Configuring Arrays 11.0 Installing ISA Server 2004 Enterprise Edition 11.1 Configuring Arrays Chapter 5 Monitoring and Reporting 11.2 Troubleshooting Array Configuration 5.1 Monitoring and Reporting Chapter 12 Enterprise and Array Policies 5.2 Performance Monitor Chapter 6 Configuring Toolbox Elements 6.1 Configuring Toolbox Elements 6.2 Network Objects 12.1 Using Enterprise and Array Policies 12.2 Enterprise Policy Administration 12.3 Array Policy Administration www.itttc.net Chapter 13 Enterprise Technologies Lab #8 System Policy Lab #9 Overview of Firewall Policy 13.1 Enterprise Technologies and ISA Server 2004 Lab #10 Access Rules 13.2 Network Load Balancing Lab #11 Web & Server Publishing Lab #12 Working with Network Templates Lab #13 Networks & Network Sets & Network Rules Lab #14 Web & Firewall Chaining Lab #15 ISA Server Security and Administration Overview Lab #16 Security Policy Administration Lab #17 Securing VPN Access Lab #18 Site to Site VPN Configuration Lab #19 Installing ISA Server 2004 Enterprise Edition Lab #20 Configuring Arrays Lab #21 Enterprise Policy Administration Lab #22 Enterprise Technologies and ISA Server 2004 Lab #23 Network Load Balancing Lab #24 ISA Server 2006 System Requirements Lab #25 ISA Server 2006 Editions Comparison Lab #26 ISA Server 2006 New Features Chapter 14 ISA Server and Exchange Server 2003 14.1 Configuring ISA Server with Exchange Server 2003 14.2 Remote Access for Exchange Clients Chapter-15 ISA Server 2006 Enterprise Edition 15.1 ISA Server 2006 System Requirements 15.2 ISA Server 2006 Editions Comparison 15.3 ISA Server 2006 New Features 15.4 65 ISA Server 2006 Key Features ISA Server Labs Lab #1 ISA Server 2004 ON-LINE HELP Lab #2 Installing & Configuring ISA Server 2004 Standard 70-350 Additional Information Edition x E-book & MOC, Skillsoft Lab #3 ISA Server 2004 Client Types x ISA Server 2004 Enterprise Edition SP2 Software Lab #4 Monitoring and Reporting x Lab #5 Performance Monitor Lab #6 Configuring Toolbox Elements x Windows Vista Ultimate Lessons and Lab Lab #7 Network Objects x VMWare Workstation Software x VMWare Workstation Software Training in Farsi x Windows XP Service Pack 3 Information x Windows XP Animations ITTTC Utilities CD www.itttc.net Microsoft MCTS MCITP Server Administrator Enterprise Administrator Database Administrator Enterprise Messaging Administrator www.itttc.net www.itttc.net MCTS / MCITP 70-620 Installing and Configuring Windows Vista Ultimate Chapter 1 Introduction to Windows Vista Administration 6.4 Local User Accounts and Groups 6.5 Remote Access 1.1 Windows Vista Overview 1.2 Vista Upgrade Considerations 1.3 Installing Windows Vista 1.4 Troubleshooting Installation Problems 1.5 Windows Vista Architectural Changes 1.6 Automating the Windows Vista Installation Chapter-7 Managing Laptops and Traveling Users 7.1 Power Management Settings 7.2 Networking for Laptops Chapter-8 Configuring User and Computer Policies Chapter 2 Managing Windows Vista Systems 2.1 Getting Around Windows Vista 2.2 User Account Control and Elevation Prompts 2.3 Supporting Computers Running Windows Vista 2.4 System Support Tools 2.5 System Properties Drivers Automated Help And Support 3.2 Devices & Device Manger & Device Drivers 3.3 Managing & Customizing Hardware 3.4 Internet Time Group Policy Essentials 8.2 Configuring Policies 8.3 Access & Connectivity Policies 8.4 Computer & User Scripts Policies Chapter-9 Managing Disk Drives & File System Chapter 3 Configuring Systems, Hardware Devices, and 3.1 8.1 9.1 Disk Drives & File Systems 9.2 Disk Performance 9.3 Working with Basic & Dynamic Disks 9.4 Using Basic & Dynamic Disks 9.5 Disks, Partitions & Volumes 9.6 Partitioning Disks Chapter-10 Managing File Security & Resource Sharing Chapter 4 Customizing the Desktop and the Interface 4.1 Desktop and the Interface Part 1 4.2 Desktop and the Interface Part 2 Chapter 5 Installing and Maintaining Programs 5.1 Installing and Maintaining Programs 5.2 Program Compatibility & Managing Programs 10.1 File Security & Resource Sharing 10.2 File & Folder NTFS Permissions 10.3 Sharing Files & Folders over the Network 10.4 Public Folder Sharing Chapter-11 Explorer Options, Offline Lines & Disk Quotas 11.1 Configuring Advanced Explorer Options 11.2 Offline Files 11.3 Disk Quotas Chapter 6 Managing User Access and Security 6.1 User and Group Accounts 6.2 Local Logon 6.3 Stored Passwords www.itttc.net Chapter-12 TCP/IP Networking 70-620 Windows Vista Ultimate Labs 12.1 Windows Vista Networking Features Chapter-1 Labs 12.2 TCP/IP & Dual IP Stack 12.3 Local Area Connections 12.4 Resolving Local Area Connection Problems 12.5 IPv4 Addressing Lab #1 Installing Windows Vista Ultimate Lab #2 Task Bar & Start Menu Properties Lab #3 Vista Applications, Desktop, Recycle Bin, UAC & Control Panel Overview Lab #4 CTL-ALT-DEL Options Lab #5 Password Reset Disk Lab #6 System Overview Lab #7 System Configuration Lab #8 BCDEDIT Lab #9 Sysprep Chapter-13 Mobile Networking & Remote Access 13.1 Mobile Networking & Remote Access 13.2 Creating Remote Access Connections 13.3 Configuring Connection Properties 13.4 Wireless Networking Chapter-2 Labs Chapter-14 Advanced Internet Options and Security 14.1 Internet Options and Security 14.2 Cookies & Other Internet Files 14.3 Security Zones Chapter-15 Optimizing Windows Vista 15.1 15.2 15.3 15.4 15.5 15.6 Safeguarding Disk Drives Windows Security Center Windows Firewalls Windows Defender Automatic Updates Reliability & Performance Monitor Remote Assistance & Event Logs Task Scheduling Backing up & Recovering a Computer Troubleshooting Startup & Shutdown Task Bar Control Panel MMC, Snap-ins, Computer Management, Windows Management Instrumentation (WMI) UAC & Security Settings UAC Settings Disk Cleanup File Signature Verification System Properties System Restore Chapter-3 Labs Chapter-16 Supporting & Troubleshooting Windows Vista 16.1 16.2 16.3 16.4 Lab #1 Lab #2 Lab #3 Services Lab #4 Lab #5 Lab #6 Lab #7 Lab #8 Lab #9 Lab #10 Lab #1 Lab #2 Lab #3 Lab #4 Lab #5 Lab #6 Lab #7 Lab #8 Lab #9 Lab #10 Lab #11 Lab #12 Lab #13 Lab #14 Lab #15 Lab #16 Lab #17 www.itttc.net Problem Reports and Solutions Windows Memory Diagnostics Tool Vista Support Services Troubleshooting and Diagnostics using GPO Windows Update & Windows Ultimate Extras Device Manager Device Drivers Using Signed and Unsigned Drivers using GPO Driver Searching using GPO Restricting Driver Installation using GPO Keyboard Settings Mouse Settings Audio Driver Regional Options & Settings Windows Time Service Configuring Internet Time for Workgroups Configuring Internet Time for Domains Chapter-4 Labs Lab #8 Configuring Assigning Computer & User Scripts in GP Lab #1 Personalization Lab #2 Start Menu & Search Lab #3 Vista Gadgets Chapter-9 Labs Chapter-5 Labs Lab #1 Lab #2 Lab #3 Lab #4 Lab #5 Lab #6 Lab #7 Lab #8 Lab #9 Lab #10 Lab #11 Administrative Privilege User Account Control & RunAS UAC Security Options using GPO Default Programs Accessories Turning Features ON or OFF Windows Vista Contacts Windows Vista Calendar Windows Mail Windows Meeting Space Windows Media Center, Media Player, Photo Gallary Chapter-6 Labs Lab #1 Lab #2 Lab #3 Lab #4 Lab #5 Lab #6 Lab #7 Users and Groups Interactive Logon using Security Options in GPO Logon Settings using GPO Key Ring Entries Secure Guest Account Remote Assistance & Remote Desktop Remote Desktop Connection Lab #1 Disk Management Lab #2 Configuring Dynamic Disk & Volumes Spanned & Simple Volumes Lab #3 GPT vs. MBR Lab #4 Disk Scaling Lab #5 Diskpart Command Lab #6 Convert Command Chapter-10 Labs Lab #1 NTFS Permissions Lab #2 Shared Folders Lab #3 Public Folders Chapter-11 Labs Lab #1 Lab #2 Lab #3 Lab #4 Configuring GP settings for Windows Explorer Sync Center Offline Files Disk Quotas Chapter-12 Labs Lab #1 Lab #2 Lab #3 Lab #4 Network and Sharing Center Network Connections & Bridging Local Area Connection Properties & TCP/IP Settings IPCONFIG Command & Options Chapter-7 Labs Chapter-13 Labs Lab #1 Lab #2 Lab #3 Lab #4 Lab #5 Lab #6 Lab #7 Lab #8 Lab #9 Power Plans & Power Options Powercfg Command Power Management using GPO Sleep Mode TCP/IP Addressing Configuration Overview Netsh Command Connecting to a Network Projector Printing Print Management Chapter-8 Labs Lab #1 Lab #2 Lab #3 Lab #4 Lab #5 Lab #6 Lab #7 Group Policy Object Settings Overview Configuring Policy Templates in GP Configuring Disk Quota setting in GP Configuring System Restore settings in GP Configuring Offline Files settings in GP Configuring Networking settings in GP Configuring Remote Assistance settings in GP Lab #1 Lab #2 Lab #3 Lab #4 Lab #5 Lab #6 Phone & Modem Connection Creating and Configuring a Dial-up Connection Creating and Configuring a Broadband Connection Creating and Configuring a VPN Connection Enabling or Disabling Windows Firewall per Connection Proxy Settings Chapter-14 Labs Lab #1 Configuring IE settings in Group Policy Lab #2 Configuring Parental Control Lab #3 Configuring IE 7 Options Popup Filter, Phishing Filter www.itttc.net Chapter-15 Labs Lab #1 Lab #2 Lab #3 Lab #4 Lab #5 Lab #6 Lab #7 Lab #8 Chkdsk TPM BitLocker Windows Security Center Windows Firewall Windows Firewall with Advanced Security Windows Defender Configuring Windows Update in GP Windows Vista Utilities CD x x x x Chapter-16 Labs Lab #1 Lab #2 Lab #3 Lab #4 Lab #5 Lab #6 Event Viewer Task Scheduler Windows Easy Transfer Backup & Restore Center Task Manager Reliability and Performance Monitor www.itttc.net 70-620 Exam Windows Vista E-books VMWare Workstation Software VMWare Workstation Software Training in Farsi MCTS 70-236 Microsoft Exchange Server 2007 Implementation & Maintenance Chapter 1 Exchange Server 2007 Deployment Chapter 5 Exchange Server 2007 Security & Data Storage Groups 1.1 Overview, Hardware & Editions 1.2 Exchange Server, Windows & Active Directory 5.1 Exchange Server 2007 Security 1.3 Administration Tools 5.2 Exchange Administrator Permissions 1.4 Messaging Roles 5.3 Auditing 1.5 Exchange Server Roles & Active Directory 5.4 Information Store 1.6 Exchange Server & Existing Exchange Organizations 5.5 Content Indexing Chapter 2 Managing Exchange Server 2007 Chapter 6 Mailbox & Public Folder Database Clients & Mobile Messaging Users Administration 2.1 Mail Clients 6.1 Mailbox and Public Folder Database Administration 2.2 Managing Exchange Server Service in Outlook 2007 6.2 Public Folder Databases & Managing Databases 2.3 Mail Profiles 6.3 Managed Folders and Managed Records 2.4 Mobile Messaging Users 6.4 Accessing and Managing Public Folders 2.5 Mobile Device & Wireless Access 2.6 Remote Mail and Outlook Anywhere Chapter 7 Managing Transport Servers and Client Access Servers Chapter 3 Exchange Server 2007 Administration & Exchange Management Shell 7.1 Managing Hub Transport and Edge Transport Servers 7.2 Completing Transport Server Setup 3.1 Exchange Server 2007 Organizations 7.3 Managing Message Pickup and Replay 3.2 Data Storage 7.4 Managing Accepted Domains & Email Policies 3.3 Message Queues 7.5 Remote Domains, Antispam & Message Filtering Options 3.4 Exchange Management Shell 7.6 Managing Client Access Servers 3.5 Cmdlets 7.7 Enabling POP3 and IMAP4 & Deploying Outlook Anywhere Chapter 4 User, Contact, Mailbox Administration, 7.8 Managing Exchange Server Features for Mobile Devices Groups & Address Lists Chapter 8 Exchange Server 2007 Maintenance, 4.1 User and Contact Administration 4.2 Managing User Accounts and Mail Features 4.3 Mailbox Administration 8.1 Troubleshooting, Logging & Tracking 4.4 Distribution Groups and Address Lists 8.2 Monitoring Events, Services, Servers, and Resource Backup & Restore Usage 8.3 Exchange Queues 8.4 Backing Up and Restoring Exchange Server 2007 8.5 Recovering Exchange Server & Restoring Mailboxes www.itttc.net Chapter-9 Exchange Server 2007 Clustering Solution Center & FAQ 9.1 Clustering Overview 1.7 Exchange Server 2007 Solution Center 9.2 Single Copy Clusters 1.8 Exchange Server 2007 FAQ 9.3 Clustered Continuous Replication Clusters 9.4 High Availability & Server Availability Exchange Server 2007 Labs Appendix-A Active Directory Lessons Lab-0 Installing Exchange Server 2007 Lab-1 Exchange Server 2007 Maintenance Mode A1 Active Directory Overview Lab-2 Exchange Management Console Overview A2 Active Directory Logical & Physical Structures Lab-3 Windows PowerShell Overview A3 Active Director Data Store Lab-4 Exchange Management Shell Overview A4 Installing & Configuring Active Directory Lab-5 Microsoft Exchange Security Groups A5 Active Directory Administrative Consoles Lab-6 Modify Configuration Domain Controller & Recipient A6 Domain and Forest Functional Levels Scope Appendix-A Active Directory Lessons Lab-7 Event Viewer Logs & Exchange Services Lab-8 Recipient Configuration Node (User Mail Box) Lab-9 Recipient Configuration Node (Room Mail Box) A7 Active Directory Installation and Removal Lab-10 Recipient Configuration Node (Equipment Mail Box) A8 Active Directory Installation Verification Lab-11 Recipient Configuration Node (Link Mail Box) A9 Active Directory Setup Logs Lab-12 Recipient Configuration Node (Mail Contact) A10 Domain and Forest Functional Levels Lab-13 Recipient Configuration Node (Mail User) Lab-14 Distribution & Dynamic Distribution Groups Lab-15 Recipient Configuration Review Lab-16 Server Configuration (Mailbox Role) Lab-17 Mailbox Role : Mailbox & Public Folder Database Lab-18 Server Configuration (Client Access Role) Appendix-B Exchange Server 2007 Information ONLINE HELP 1.1 Exchange 2007 ONLINE Help Overview Lab-19 Server Configuration (Hub Transport Role) 1.2 Exchange 2007 ONLINE Help Categories Lab-20 Creating a New SMTP Receive Connector 1.3 Exchange 2007 ONLINE Help Getting Started Lab-21 Add New Exchange Administrator Role Lab-22 Configuring Service Startup Lab-23 Creating a New Address Lists Lab-24 Managed Default Folders Product Information & Versions 1.4 Exchange Server 2007 Product Information Lab-25 Managed Custom Folders 1.5 Exchange Server Version Comparison Lab-26 Managed Folder Mailbox Policies Lab-27 Offline Address Book Lab-28 Assigning Advanced Exchange Server Permissions Lab-29 Auditing Exchange Server Usage Service Pack 1 & Update Rollup 1 1.6 Exchange Server 2007 Service Pack 1 Lab-30 Hub Transport: Remote Domains 1.7 Update Rollup 1 for Exchange Server 2007 SP1 Lab-31 Hub Transport: Accepted Domains www.itttc.net Exchange Server 2007 Labs Utilities DVD Lab-32 Hub Transport: Email Address Policies x Exchange Server 2007 Software DVD 32-bit Edition Lab-33 Hub Transport: Transport Rules x Exchange Server 2007 E-books Lab-34 Hub Transport: Journaling x Exchange Server 2007 Installation Components Lab-35 Hub Transport: Send Connectors x VMWare Workstation Software Lab-36 Hub Transport: Edge Subscriptions x VMWare Workstation Training in Farsi Lab-37 Exchange Server 2007 Performance Counters x Exchange Glossary Lab-38 Mail Client: Outlook 2007 Online Help x Exchange Server 2007 Tools Lab-39 Mail Client: Outlook 2007 Overview x Exchange Server 2007 CBT Lab-40 Mail Client: Outlook 2007 Details Lab-41 Mail Client: Outlook 2007 Web Site Lab-42 Toolbox: Best Practice Analyzer Lab-43 Toolbox: Database Recovery Management Lab-44 Toolbox: Database Troubleshooter Lab-45 Toolbox: Mail Flow Troubleshooter Lab-46 Toolbox: Message Tracking Lab-47 Toolbox: Queue Viewer Lab-48 Toolbox: Performance Troubleshooter Lab-49 Tools Web Site Lab-50 Exchange 2007 File Paths Lab-51 Exchange Server 2007 Backup & Restore Lab-52 Exchange Setup Parameters Lab-53 Office Outlook Web Access Lab-54 Creating Multiple Storage Groups Lab-55 Enabling & Verifying LCR Lab-56 PowerShell Scripts, Properties & Commands Lab-57 Unified Messaging: Configuring Dial Plans Lab-58 Unified Messaging: Configuring IP Gateways Lab-59 Unified Messaging: Configuring Mailbox Policies Lab-60 Unified Messaging: Configuring Auto Attendants www.itttc.net www.itttc.net MCTS 70-431 Microsoft SQL Server 2005 Implementation & Maintenance Chapter 0 Introduction to RDBM & SQL Chapter 5 Introducing More Database Objects 0.1 Database Basics 5.1 Stored Procedures 0.2 SQL Basics Part I 5.2 Triggers 0.3 SQL Basics Part II 5.3 Event Notifications 5.4 Functions Chapter 1 Installing Microsoft SQL Server 2005 5.5 User Defined Types 1.1 Introduction to SQL Server 2005 Chapter 6 Implementing Security in SQL Server 2005 1.2 Prerequisites 1.3 Preparing to Install 6.1 SQL Server Security Modes 1.4 Upgrading from a Previous version 6.2 SQL Server Logins & Fixed Server Roles 1.5 Installing SQL Server 2005 6.3 Creating Database User Accounts 1.6 Relational Database Concepts 6.4 Permissions & Permission States 1.7 SQL Server Management Studio 6.5 Database Roles 6.6 Ownership Chains 6.7 Linked Server Security 6.8 Encryption & Security Plan Chapter 2 Creating and Configuring Databases 2.1 Planning your database 2.2 Filegroups 2.3 Database File Placement 2.4 Creating Data Storage Structures 7.1 Transactions 2.5 Estimating Storage Requirements 7.2 Populating Tables 2.6 Creating and Configuring Databases 7.3 Bulk Inserting XML & Bulk-Logged Recovery Model 7.4 Supporting Different Collation Types and Orders When Chapter 7 Working with Relational Data Querying Data Chapter 3 Working with Tables and Views 7.5 Casting and Converting 3.1 Planning Tables 7.6 Datatype Precedence & Collations 3.2 Introducing Built-in Data Types 7.7 Error Handling 3.3 Creating Tables 3.4 Restricting the Data 3.5 Partitioning Tables 3.6 Understanding Views Chapter 4 Performing Indexing and Full-Text Chapter 8 Working with XML Data 8.1 XML Data, Datatypes & XML Schema 8.2 Querying XML Data 8.3 Creating XML Indexes Searching Chapter 9 Working with Service Broker and HTTP 4.1 Index Architecture 9.1 Service Broker 4.2 Clustered Indexes 9.2 Working with Service Broker 4.3 Non-Clustered Indexes 9.3 Using Service Broker 4.4 Indexes, Primary Keys & Full Text Searching 9.4 HTTP Endpoints www.itttc.net Chapter 10 Maintaining and Automating SQL Server 10.1 Maintaining Indexes 10.2 Maintaining Statistics 10.3 Maintaining Databases 10.4 Automation Basics 10.5 Configuring Database Mail 10.6 Creating Operators & Jobs 10.7 Creating Alerts 10.8 Maintenance Plan Wizard & Copying Databases Section-1 Labs Lab 1.1 Installing SQL Server 2005 Lab 1.2 Installing SQL Server 2005 Service Pack 2 Lab 1.3 SQL Server Management Studio Overview Lab 1.4 Installing the 2nd Instance Lab 1.5 Exploring the SQL Server Management Studio Chapter 11 Performing Backups and Restores 11.1 Backup a Database 11.2 Restoring a Database 11.3 Devising a Backup Strategy 70-431 SQL Server 2005 Labs Lab 1.6 Creating Tables Section-2 Labs Lab 2.1 Creating a Database using Management Studio Lab 2.2 Gathering Information about your Database Lab 2.3 Setting Database Options Chapter 12 Achieving High Availability through Section-3 Labs Replication Lab 3.1 Creating the Products Table 12.1 Introducing Replication 12.2 Introducing the Publisher Subscriber Metaphor 12.3 Replication Factors and Distribution 12.4 Replication Internals 12.5 Replication Types 12.6 Publication & Distributor Issues 12.7 Replication Models 12.8 Replicating over the Internet and to Heterogeneous Lab 3.2 Creating the Customers Table Lab 3.3 Creating the Orders Table Lab 3.4 Creating the Valid Zip Code Constraint Lab 3.5 Testing your Constraint Lab 3.6 Creating Default Constraint Lab 3.7 Creating a Unique Constraint Lab 3.8 Creating a Partition Function and Schema Database Servers 12.9 Lab 3.9 Creating the Contact_in_398 View Lab 3.10 Creating an Updatable View Installing, Using & Managing Replication Section-4 Labs Chapter 13 Introducing More High-Availability Methods Lab 4.1 Creating a Table Scan 13.1 Choosing the High-Availability Features You Need 13.2 Database Mirroring Overview 13.3 Database Mirroring Implementation 13.4 Log Shipping 13.5 Database Snapshots Lab 4.2 Creating an Index Lab 4.3 Creating a Primary Key Lab 4.4 Creating a Full-Text Catalog & Index Chapter 14 Monitoring and Optimizing SQL Server 2005 14.1 System Monitor 14.2 SQL Profiler & Database Engine Tuning Advisor 14.3 Troubleshooting SQL Server www.itttc.net Lab 8.10 Creating an Alert for a Standard Error Section-5 Labs Lab 8.11 Testing an Alert with RAISEERROR() Lab 5.1 Viewing System Stored Procedures in Object Explorer Lab 8.12 Creating and Firing an Alert Based on a Custom Error Lab 5.2 Using Predefined Templates Lab 8.13 Creating a Performance Alert Lab 5.3 Creating a Simple Stored Procedure Lab 8.14 Creating a WMI Alert Lab 5.4 Creating a DDL Trigger Lab 8.15 Maintenance Plan Wizard Lab 5.5 Creating a Scalar User-Defined Function Lab 8.16 Copy Database Wizard Lab 5.6 Creating a T-SQL User-Defined Type Section-9 Labs Section-6 Labs Lab 9.1 Creating a Permanent Backup Device Lab 6.1 Setting the Authentication Mode Lab 9.2 Performing a Full Backup Lab 6.2 Creating Standard Logins Lab 9.3 Performing a Differential Backup Lab 6.3 Creating Windows Accounts Lab 9.4 Performing a Transaction Log Backup Lab 6.4 Creating SQL Server Logins for Windows Accounts Lab 9.5 Performing a Filegroup Backup Lab 6.5 Testing SQL Server Logins for Windows Accounts Lab 9.6 Backing Up to Multiple Devices Lab 6.6 Adding Logins to Fixed Server Roles Lab 9.7 Restoring a Database Lab 6.7 Creating User Accounts in AdventureWorks Lab 6.8 Statement and Object Permissions Lab 6.9 Adding Users to Fixed Database Roles Section-10 Labs Lab 6.10 Creating and Adding Users to Custom Database Roles Lab 6.11 Creating an Application Role Lab 10.1 Installing a Distribution Server Lab 10.2 Creating a Publication Lab 10.3 Creating a Subscription Lab 10.4 Replication Monitor Section-7 Labs Section-11 Labs Lab 7.1 bcp & sqlcmd parameters Lab 7.2 Bulk-Logged Recovery Model Lab 11.1 System Monitor Lab 7.3 TRY…CATCH Block Lab 11.2 Creating a Trace with Profiler Lab 11.3 Replaying a Trace Section-8 Labs Lab 11.4 Database Engine Tuning Advisor Lab 11.5 Reading SQL Server & Windows Event Logs Lab 8.1 Reconstructing an Index Lab 11.6 Activity Monitor Lab 8.2 Updating Index Statistics Lab 11.7 Connecting to the DAC Lab 8.3 Using DBCC CHECKDB on AdventureWorks Lab 8.4 Shrinking the Database Lab 8.5 Configuring a Mailhost Lab 8.6 Configuring the SQL Server Agent to Use the A1 SQL Server 2005 Books Online Mailhost A2 SQL Server 2005 Product Information Lab 8.7 Configuring an Operator A3 Update package 7 for SQL Server 2005 Service Pack 2 Lab 8.8 Creating a Fail-Safe Operator A4 SQL Server 2005 Solution Center Lab 8.9 Creating a Job A5 SQL Server 2008 Product Information Appendix-A www.itttc.net SQL Server 2005 & 2008 70-431 Utilities DVD x SQL Server 2005 E-books x 70-431 Exam x SQL Server 2005 Software Evaluation Edition (CD-1, CD-2 & SP1) x VMWARE Software x SQL Server CBT www.itttc.net Cisco CCNA CCNP Cisco VoIP www.itttc.net www.itttc.net CCNA 640-802 (ICND-1 640-822 + ICND-2 640-816) Cisco Certified Network Associate Routing Units Chapter-0 Evolving Network Model 0.1 IIN & SONA 0.2 Campus Network 0.3 Enterprise Model Unit-4 IP Routing & Routing Protocols 4.1 Distance Vector vs. Link State Routing 4.2 Link State Operation 4.3 Routing Updates 4.4 Routing Tables Unit-5 Dynamic Routing Protocols Part I Unit-1 Internetworking 1.1 Internetworking 1.2 OSI Model 1.3 Ethernet Networks 1.4 Ethernet Cabling 1.5 Network Domain 1.6 Ethernet Addressing 1.7 Cisco 3-Layer Hierarchical Model 1.8 Ethernet Frame Types Unit-2 TCP/IP Addressing & Protocols 2.1 IP Addressing Overview 2.2 IP Subnetting Part I 2.3 VLSM Part I 2.4 NAT Overview 5.1 RIP v1 Overview 5.2 IGRP Overview 5.3 EIGRP Overview 5.4 OSPF Overview Unit-6 Managing a Cisco Router & Internetwork 6.1 Router Configuration Register 6.2 Router Password Recovery 6.3 IOS Image Backup and Upgrade 6.4 IP Host Tables Unit-7 IP Access Lists 7.1 Standard IP Access List 7.2 Extended IP Access List Unit-3 Basic Router Configuration Switching & WAN Units 3.1 Cisco Routers Unit-1 Layer-2 Switching 3.2 Connecting to a Cisco Router 3.3 Booting a Cisco Router 1.1 Ethernet Overview 3.4 Cisco Router Components 1.2 Switch vs. Bridge 3.5 Cisco Router Models 1.3 Switch Functions 3.6 Cisco Router Passwords 1.4 How a Switch Works (Example) 3.7 Cisco Router Commands 1.5 LAN Switch Types 3.8 Cisco Router Banner 1.6 Configuring Cisco 1900 Series 3.9 Cisco Router Interfaces 1.7 Configuring Cisco 2950 Series 3.10 Cisco Router Serial Interfaces 1.8 Cisco Switch Verification 3.11 Router Configuration Commands 1.9 Switch Port Security 3.12 Troubleshooting 1.10 Static MAC Addresses 3.13 Verifying Router Configuration 1.11 Port Security on 1900 www.itttc.net 1.12 Port Security on 2950 5.4E Example: LMI Configuration 1.13 CDP Overview 5.5 Frame Relay Congestion Control 1.14 CDP Commands 5.6 Subinterfaces 5.7 Monitoring Frame Relay Unit-2 Spanning Tree Protocol Routing, Switching & WAN Part II 2.1 STP Overview 2.2 STP Terminology 2.3 STP Operation 2.4 STP Port States 2.5 When to use STP 2.6 STP Examples Unit-3 Virtual LANs 3.1 VLAN Overview 3.2 VLAN Trunking 3.3 VLAN Trunking Protocols 3.4 VTP Pruning 3.5 Routing between VLANs 3.6 Configuring VLANs 3.7 Configuring Trunk Ports 3.6 Configuring Inter-VLAN Routing 3.7 Configuring VTP Unit-4 Wide Area Network 4.1 Introduction to WANs 4.2 WAN Terminology 4.3 WAN Interface Types 4.4 WAN Connection Types 4.5 WAN Protocols (HDLC) 4.6 WAN Protocols (PPP & Its Components) 4.7 PPP LCP Configuration Options 4.8 PPP Session Establishment & Auth. Methods 4.9 Configuring & Verifying PPP Unit-5 Frame Relay 5.1 Introduction to Frame Relay 5.2 Frame Relay Technology and Terminology 5.3 Frame Relay Encapsulation, VCs & DLCI 5.4 Local Management Interface Unit-1 TCP/IP Addressing & Protocols 1.1 IP Subnetting Part II 1.2 VLSM Part II 1.3 TCP/IP Suite Overview 1.4 Application Layer Protocols 1.5 Transport Layer Protocols 1.6 Internet Layer Protocols Unit-2 Cisco’s IOS and Security Device Manager 2.1 SSH, Do Command & using the PIPE 2.2 Cisco Security Device Manager (SDM) 2.3 Cisco ASDM 5.2 for ASA (Demo) 2.4 SDM User Guide Unit-3 IP Routing & Routing Protocols 3.1 Routing Basics 3.2 IP Routing Examples 3.3 Routing Loops 3.4 RIPv2 Unit-4 Dynamic Routing Protocols Part II 4.1 EIGRP Overview 4.2 Configuring EIGRP 4.3 OSPF 4.4 Configuring OSPF 4.5 Configuring EIGRP & OSPF Summary Routes 4.6 Route Redistribution Unit-5 Managing a Cisco Router & Internetwork 5.1 Boot System Command and using Cisco IFS 5.2 Using SDM 5.2 for ASA to Manage Configuration Files www.itttc.net Unit-6 Layer-2 Switching & Advanced STP Topics 11.5 Migrating to IPv6 11.6 Configuring IPv6 6.1 Cisco 2960 Switches 6.2 Switching Services 6.3 PostFast, UplinkFast & BackboneFast 6.4 RSTP & Etherchannel 12.1 Cable & DSL 6.5 Catalyst Switch Configuration 12.2 Using SDM for WAN Connections 6.6 Getting Started with Cisco Network Assistant 12.3 VPNs Unit-12 WAN Part II 12.4 Introduction to Cisco IOS IPSec 12.5 Using ASDM 5.2 for ASA for VPN & IPSec Unit-7 Voice VLANs 12.6 Effective Bandwidth 7.1 Configuring Voice VLANs & IP Phone Voice Traffic 7.2 Using the CNA to Configure VLANs & Inter-VLAN Unit-13 Cisco Special Topics Routing 13.1 Telephony Network 13.2 PBX vs. Key System Unit-8 Security 13.3 Signaling 8.1 Secured Networking and Cisco IOS Firewalls 13.4 VoIP Network Components & Advantages 8.2 Advanced ACLs 13.5 Overview of Traffic Types 13.6 Multicast Addressing 13.7 DHCP Overview Unit-9 Network Address Translation 13.8 Configuring DHCP 9.1 NAT, NAT Types & NAT Names 9.2 How NAT Works 9.3 Testing & Troubleshooting NAT 9.4 Using ASDM 5.2 for ASA to Configure NAT 13.9 DHCP Verification Commands Routing Labs Unit-10 Cisco’s Wireless Technologies Lab-1 Basic Router Configuration Lab-2 Routing in Two Subnets Lab-3 Routing in Four Subnets 10.1 Wireless Networking Overview Lab -4 Using Static and Default Routes 10.2 802.11 Standards Lab -5 Serial Communication 10.3 Cisco’s Unified Wireless Solution Lab -6 Configuring RIPv1 10.4 Split MAC Architecture Lab -7 Configuring IGPR 10.5 Wireless Security Lab -8 Configuring EIGRP Lab -9 Configuring OSPF Unit-11 IPv6 Lab -10 Configuring IP ACLs 11.1 Needs and Benefits of IPv6 11.2 IPv6 Addressing & Address Types 11.3 IPv6 Autoconfiguartion 11.4 Configuring Cisco Routers with IPv6, DHCPv6 & ICMPv6 11.5 IPv6 Routing Protocols www.itttc.net Switching and WAN Labs x CCNA 640-802 Exam x Cisco Configuration Whitepapers (12) x Cisco Tools Configuration Guides: Lab-1 PC to PC Communication Lab-2 Configuring CDP x Cisco Switch 2960 Configuration Guide Lab-3 LAN Switching 2950 x Cisco Network Assistant Lab-4 Configuring 1900 Series Switches x Cisco Security Device Manager Lab-5 Configuring the 2950 Switches Lab-6 Configuring STP on 1900 Series Lab-7 Configuring VLAN on 1900 Series Lab-8 Configuring VLAN on 2950 Switches Lab-9 Configuring VLAN Trunking Cisco CCNA 640-802 Video Mentor (ICND-1 & ICND-2) Labs ICND1 Labs Lab-10 Configuring & Verifying PPP Lab 1 Navigating a Router/Switch Command-Line Interface Lab-11 Configuring and Verifying Frame Relay Lab 2 Router Configuration and Managing Configuration Files Lab-12 Configuring and Verifying FR Subinterfaces Lab 3 Switch Basics: Learning, Forwarding/Filtering, and Interface Settings Lab 4 Finding the Subnet Number Review Scenarios Lab 5 Finding the Broadcast Address and Range of Addresses in a Subnet x OSI, Ethernet, NAT , Connections x TCP/IP Protocols, Addressing, Subnetting x IOS Commands, Routes, IP Routing Table x CDP & Administrative Distance x Routing Protocols x RIP, IGRP, EIGRP & OSPF x Switch & Switch Configuration x STP General, Port States, Root Bridge x VLAN Configuration, VLAN Troubleshooting, VTP x Configuration Registration, Password Recovery, Lab 6 Finding All Subnets of a Network with Less Than 8 Subnet Bits Lab 7 IP Subnet Design and Implementation Lab 8 Static and Connected Routes Lab 9 RIP Configuration ICND2 Labs Configuration Files, IOS Images Lab 1 Configuring VLANs Lab 2 VTP Servers and Clients Lab 3 RIP V1 with Split Horizon, Route Poisoning, and Poison x Standard IP ACLS, Extended IP ACLs x WAN (HDLC & PPP & ATM) Lab 4 Single Area and Multi-area OSPF Configuration x Frame Relay General & Configuration Lab 5 EIGRP Configuration and Operation Lab 6 Understanding EIGRP Metric Calculations Lab 7 NAT Overload (PAT) Lab 8 IPv6 Subnetting and Address Configuration Reverse ITTTC CCNA 640-802 Utilities CD x Boson NetSIM 6 Lab 9 PPP and CHAP Configuration x Cisco CCNA Discovery & Exploration Lab 10 Access Lists x E-books Lab 11 Access Lists II x Tools: ADSM 5.21, IP Subnet Calculator, SDM, Wildcard Calculator x CCNA 640-802 Video Mentor Labs www.itttc.net CCNP BSCI 642-901 Building Scalable Cisco Internetworks Chapter-0 Evolving Network Model Chapter-6 EIGRP in Scalable Networks 0.1 IIN & SONA 6.1 EIGRP Usage 0.2 Campus Network 6.2 EIGRP Scalability 0.3 Enterprise Model Chapter-7 Integrated IS-IS Chapter-1 IP Routing Principles 7.1 Integrated IS-IS Overview 1.1 Routing Fundamentals 7.2 Integrated IS-IS Operation 1.2 Routing Environment and Protocols 7.3 Configuring Integrated IS-IS 1.3 Routing Protocols and Convergence 7.4 Verifying and Troubleshooting Integrated IS-IS 1.4 Routing Table Analysis Chapter-8 Configuring BGP Chapter-2 IP Addressing 8.1 BGP Overview 2.1 IP Addressing Overview 8.2 BGP Terminology and Attributes 2.2 VLSM Fundamentals 8.3 BGP Operation 2.3 Route Summarization 8.4 BGP Configuration 2.4 CIDR Mechanism and Helper Address CS Case Study: BGP Chapter-3 Configuring OSPF in a Single Area Chapter-9 Implementing BGP in Scalable Networks 3.1 OSPF Fundamentals 9.1 BGP Scalability Issues and Solutions 3.2 OSPF Operating Environments 9.2 Policy Control Fundamentals 3.1 Configuring OSPF in a Single Area 9.3 Multihoming 9.4 Redistributing with IGPs CS Case Study: Prefix Lists CS Case Study: Multihomed BGP Chapter-4 Interconnecting Multiple OSPF Areas 4.1 Creating Multiple OSPF Areas 4.2 OSPF Operation Across Multiple Areas 4.3 Configuring OSPF Multiarea Components 4.4 Route Summarization 10.1 Routing Protocols and Redistribution CS Case Study: Multiarea OSPF Configuration 10.2 Configuring Redistribution 10.3 Controlling Routing Update Traffic Chapter-5 EIGRP Operation and Configuration CS Case Study: Redistribution 5.1 EIGRP Fundamentals Chapter-11 Policy Based Routing Configuration 5.2 EIGRP Operation 5.3 EIGRP Configuration Chapter-10 Network Connections 11.1 Route Maps 11.2 Policy Based Routing www.itttc.net Chapter-12 Multicasting 12.1 Overview of Traffic Types 12.2 Multicast Addressing 12.3 Client Registration 12.4 Multicast Routing 12.5 Multicasting and Switches 12.6 Configuring your RPs Chapter-13 DHCP & Configuration CCNP BSCI Utilities CD BSCI Labs Lab-1 Configuring EIGRP Lab-2 Configuring OSPF for Multiple Areas and Frame Relay Nonbroadcast Lab-3 Configuring Multihome BGP Lab-4 Configuring Multicast Tools, Whitepapers & Exam 13.1 DHCP Overview and Addressing 13.2 Configuring DHCP 13.3 IP Helper Address and DHCP Relay Services x ADSM 5.21 13.4 DHCP Verification Commands x IP Subnet Calculator 13.5 Configuring DHCP x Packet Tracer x Security Device Manager (SDM) x Wildcard Calculator x NetSIM 6 Chapter-14 IPv6 14.1 IPv6 Overview & Address Representation x Cisco Configuration Whitepapers (17 Whitepaper) 14.2 IPv6 Header Fields x 642-901 Practice Exam 14.3 IPv6 Address Types & Mobility 14.4 IPv6 Routing using OSPFv3 14.5 Configuring and Verifying OSPFv3 14.6 IPv6-to-IPv4 Transition Mechanisms Cisco BSCI Flash Simulation Labs Lab-1 Network Discovery - Router 1 Lab-2 Network Discovery - Router 2 Lab-3 Network Discovery - Router 3 Lab-4 IP Address - Helper Command Lab-5 Configuring Single Area OSPF Lab-6 Verifying Single Area OSPF Lab-7 Configuring OSPF- NBMA Environment Lab-8 Enabling OSPF- NBMA Network Lab-9 Configure Multi-area OSPF Network Lab-10 Configure Multi-area OSPF Network II Lab-11 Stub Areas Lab-12 Totally Stubby Areas Lab-13 Not So Stubby Areas – Creation Lab-14 Virtual Links – Setup Lab-15 Virtual Links – Creation Lab-16 Redundant EIGRP - Routers A-C Lab-17 Redundant EIGRP - Routers D-E Lab-18 Redundant EIGRP - Testing www.itttc.net Lab-19 EIGRP Across Frame - Relay I Lab-20 EIGRP Across Frame - Relay II Lab-21 Configuring BGP Lab-22 Configuring Basic BGP Lab-23 Creating a BGP Route Reflector Lab-24 BGP Route Reflection AS 100 Lab-25 BGP Route Reflection AS 100 and 300 Lab-26 BGP Route Reflection - Router C Lab-27 Configuring BGP Connection Weight Lab-28 Route Redistribution - Routers A and B Lab-29 Route Redistribution - Routers C and D Lab-30 Route Redistribution – Verification Lab-31 Modifying Redistributed Administrative Distances Lab-32 Redistribution with Route Filters Lab-33 Route Map Creation Lab-34 IGRP Integration Lab-35 Directed-Broadcast Handling www.itttc.net www.itttc.net CCNP ONT 642-845 Optimizing Converged Cisco Networks Chapter-0 Evolving Network Model Chapter 6 Implementing QoS Pre-Classify and Deploying End-to-End QoS 0.1 IIN & SONA 0.2 Campus Network 6.1 Implementing QoS Pre-Classify 0.3 Enterprise Model 6.2 Deploying End-to-End QoS Chapter 1 Cisco VoIP Implementations Chapter 7 Implementing AutoQoS 1.1 Introduction to VoIP Networks 7.1 Introducing AutoQoS 1.2 Digitizing & Packetizing Voice 7.2 Implementing and Verifying AutoQoS 1.3 Encapsulating Voice Packets 7.3 AutoQoS Shortcoming and Remedies 1.4 Bandwidth Calculation 1.5 Implementing VoIP Support in Enterprise Network Chapter 2 IP QoS 2.1 Introduction to QoS 2.2 Identifying and Comparing QoS Models 2.3 QoS Implementation Methods Chapter 8 Wireless LAN QoS, Security & Management 8.1 Wireless LAN QoS 8.2 Wireless LAN Security 8.3 Wireless LAN Management Chapter 9 Cisco Special Topics Chapter 3 Classification, Marking & NBAR 9.1 Cisco Security Device Manager 9.2 Cisco Network Assistant 3.1 Classification and Marking 9.3 Cisco AutoQoS Animation 3.2 The DiffServ, DSCP & PHBs 9.4 Cisco IOS QoS Animation 3.3 QoS Service Class, Trust Boundaries & NBAR 9.5 Cisco QoS Solutions Configuration Guide 3.4 Configuring NBAR using IOS Chapter 4 Congestion Management and Queuing ONT Review Scenarios 4.1 Effective Bandwidth x Cisco VoIP Implementations 4.2 Congestion Management and Queuing x IP QoS 4.3 Weighted Fair Queuing x Classification, Marking & NBAR 4.4 Class-Based Weighted Fair Queuing x Congestion Management and Queuing 4.5 Low Latency Queuing x Congestion Avoidance, Policing, Shaping, and Link 4.6 Queuing Comparison Efficiency Mechanisms x Chapter 5 Congestion Avoidance, Policing, Shaping, and Link Efficiency Mechanisms 5.1 Congestion Avoidance 5.2 Traffic Shaping and Policing 5.3 Link Efficiency Mechanisms Implementing QoS Pre-Classify and Deploying End-to-End QoS x Implementing AutoQoS x Wireless LAN QoS, Security & Management www.itttc.net CCNP ONT Utilities CD ONT Labs Lab-1 Placing and Examining VoIP Calls Lab-2 Configuring CB-WFQ and LLQ Queuing Mechanisms Lab-3 Configuring Class-Based Header Compression Lab-4 Configuring LFI Tools, Ebooks, Whitepapers x ADSM 5.21 x IP Subnet Calculator x Packet Tracer x Security Device Manager (SDM) x Wildcard Calculator x NetSIM 6 x Cisco Configuration Whitepapers x Cisco ONT CBT www.itttc.net CCNP ISCW 642-825 Implementing Secure Converged Wide Area Networks Chapter-1 Network Conceptual Models Chapter-5 Cisco Device Hardening 1.1 IIN and SONA 5.1 Mitigating Network Attacks 1.2 Introduction to Campus Network 5.2 Disabling unused Cisco Router Network Services & 1.3 Enterprise Model Interfaces 5.3 Securing Cisco Router Installations and Administrative Access Chapter-2 Providing SOHO Teleworker Connectivity 5.4 Mitigating Threats and Attacks with Access Lists 2.1 Providing SOHO Teleworker Connectivity 5.5 Securing Management and Reporting Features 2.2 Cable Technology 5.6 Configuring AAA on Cisco Routers 2.3 DSL Technology 2.4 Layer-2 over DSL 2.5 Configuring DSL CPE 2.6 Troubleshooting ADSL Chapter-6 Cisco IOS Threat Defenses Chapter-3 Frame Mode MPLS 6.1 Introducing the Cisco IOS Firewall 6.2 Configuring the Cisco IOS Firewall 6.3 Introducing the Cisco IOS IPS 6.4 Configuring the Cisco IOS IPS 3.1 Introducing MPLS Networks 3.2 MPLS & MPLS VPN Terminology 3.3 Frame Mode MPLS & CEF 3.4 MPLS Routers and MPLS Labels Providing SOHO Teleworker Connectivity 3.5 Label Distribution and Label Tables Frame Mode MPLS 3.6 Penultimate Hop Popping IPSec 3.7 Configuring Frame Mode MPLS Cisco Device Hardening 3.8 MPLS VPNs Cisco IOS Threat Defenses 3.9 Handling Customer Routes ISCW Review Scenarios CCNP ISCW Utilities CD Chapter-4 IPSec ISCW Labs 4.1 IPSec 4.2 Establishing an IPSec VPN Lab-1 Configuring Frame Mode MPLS 4.3 Configuring a Site-to-Site VPN using SDM Lab-2 Configuring Site-to-Site VPN 4.4 Using and Configuring GRE Tunnel with IPSec Lab-3 Securing Cisco Routers 4.5 High Availability VPNs Lab-4 Configuring an IOS Firewall 4.6 Cisco Easy VPN & Configuring VPN Client Tools, Ebooks, Whitepapers ADSM 5.21 / IP Subnet Calculator Packet Tracer 5 / Security Device Manager (SDM) Wildcard Calculator / Cisco Configuration Whitepapers Cisco ISCW CBT / ISCW Exam www.itttc.net www.itttc.net CCNP BCMSN 642-815 Building Cisco Multilayer Switched Networks Chapter-1 Network Requirements Chapter-5 Enhancements to STP 1.1 IIN & SONA 5.1 Cisco Enhancements to STP 1.2 Campus Network 5.2 Rapid STP 1.3 Enterprise Model 5.3 Multiple Spanning Tree 1.4 Nonhierarchical Network Devices.ppt 5.4 EtherChannels 5.5 EtherChannel Configuration Commands 5.6 Other STP Enhancements 5.7 Troubleshooting Tips & Debug Commands Chapter-2 Basic Switch Operation 2.1 Layer-2 Switch Operation 2.2 Multi Layer Switch Operation 2.3 Switching Tables 2.4 Troubleshooting Switching Tables Chapter-3 Chapter-6 VLANs Implementing InterVLAN Routing 6.1 Routing Considerations 6.2 Configuring Routing between VLANs 6.3 Routing Configuration on a Switch 6.4 Router on a Stick Setup 3.1 VLANs 6.5 Multi Layer Switching (MLS) Overview 3.2 VLAN Implementations 6.6 MLS using CEF 3.3 VLAN Assignment 6.7 CEF Example 3.4 Trunks & Frame Tagging 3.5 VLAN Tagging Mechanisms Chapter-7 3.6 Native VLANs Networks 3.7 VLAN Ranges, Mapping & Services 3.8 Dynamic Trunk Protocol 7.1 Introducing HSRP Part I 3.9 Configuring, Verifying & Troubleshooting Trunk 7.2 Introducing HSRP Part II Connections 7.3 Configuring HSRP 3.10 VLAN Trunk Protocol 7.4 Virtual Router Redundancy Protocol (VRRP) 3.11 Configuring, Verifying and Troubleshooting VTP 7.5 Gateway Load Balancing Protocol (GLBP) 7.6 Redundancy with Switch Chassis Part I 7.7 Redundancy with Switch Chassis Part II Chapter-4 Implementing STP Implementing High Availability in Campus 4.1 Transparent Bridging 4.2 Spanning Tree Protocol (STP) 4.3 STP Components & Operation 8.1 WLAN Overview 4.4 STP Algorithm 8.2 802.11 Standards 4.5 Spanning Trees 8.3 Cisco's Unified Wireless Solution 4.6 Configuring and Verifying STP 8.4 Split MAC Architecture 8.5 Wireless Security 8.6 WLAN QoS 8.7 WLAN Security 8.8 WLAN Management Chapter-8 www.itttc.net Wireless LANs Chapter-9 Configuring Campus Switches to Support BCMSN Review Scenarios Voice Implement VLANs 9.1 Power Over Ethernet (PoE) Conduct the operation of STPs in a hierarchical network 9.2 Configuring & Verifying PoE Implement Inter-VLAN routing 9.3 Voice VLANs Implement gateway redundancy technologies 9.4 Voice QoS Describe and configure wireless client access 9.5 Diffserve QoS Describe and configure security features in a switched 9.6 Implementing QoS for Voice network 9.7 AutoQoS 9.8 Verifying Voice QoS Configure support for voice CCNP BCMSN Utilities CD Chapter-10 Securing your Switch BCMSN Labs 10.1 Switch Security Lab-1 Configuring VLANs and VTP 10.2 Authentication, Authorization & Accounting (AAA) Lab-2 Routing Between VLANs 10.3 Switch Port Security Lab-3 Enabling and Optimizing HSRP 10.4 Port-based Authentication with 802.1X Lab-4 Configuring IP Telephony Support 10.5 VLAN ACLs 10.6 Private VLANs (PVLAN) 10.7 PVLAN Configuration 10.8 Mitigating Spoofing Attacks Tools, Ebooks, Whitepapers ADSM 5.21 IP Subnet Calculator Packet Tracer 5 Security Device Manager (SDM) Wildcard Calculator Cisco Configuration Whitepapers BCMSN CBT BCMSN Exam www.itttc.net Introduction to Cisco Voice over IP Chapter-1 Introduction to Telephony Network Chapter-6 Quality of Service 1.1 Telephony Network 6.1 Effective Bandwidth 1.2 PBX vs. Key System 6.2 Configuring QoS 1.3 Signaling 6.3 Voice Priority 1.4 VoIP Network Components and Advantages 6.4 Congestion Management 6.5 Policing and Shaping 6.6 Shaping Frame Relay Networks 6.7 Using Compression 6.8 Applying AutoQoS Chapter-2 Digitizing Voice 2.1 Sampling 2.2 Nyquist Theorem 2.3 Waveform Compression 2.4 Voice Bandwidth Calculation Chapter-3 Preparing for a VOIP Network Chapter-7 Unified Messaging 7.1 Unified Messaging 7.2 Conference Calling 7.3 Call Centers 3.1 PBX Reliability 3.2 Reliability vs. Availability 3.3 Replacing PBX Trunks 3.4 Connecting a Router to a Phone Line 3.5 Connecting a Router to a Digital Circuit x Chapter-1 VoIP Case Study 3.6 VoIP in the Home x Chapter-2 VoIP Case Study x Chapter-3 VoIP Case Study x Chapter-4 VoIP Case Study x Chapter-5 VoIP Case Study x Chapter-6 VoIP Case Study x Chapter-7 VoIP Case Study Chapter-4 Cisco Call Manager 4.1 Cisco Call Manager 4.2 CCM Roles and Redundancy 4.3 Placing Cisco CallManagers in the Network 4.4 Partitions and Calling Search Spaces 4.5 Replacing Old Phones with IP Phones 4.6 Selecting Features for IP Phones 4.7 Securing Voice 4.8 Adding Video to Voice Calls 4.9 Cisco Call Manager Express Chapter-5 Gateway Protocols 5.1 Gateway Protocols 5.2 H.323 5.3 Cisco’s MGCP 5.4 SIP Cisco VoIP Case Studies Voice Bandwidth Calculators VoIP Utilities CD x VoIP Related Articles x VoIP Related Ebooks x WAN Configuration Review Ebooks x Information on CCVP Certification www.itttc.net www.itttc.net CWNP CWNA www.itttc.net www.itttc.net CWNA: Certified Wireless Network Administrator Chapter-1 Introduction to Wireless LANs 5.11 WLAN Accessories: RF Pigtail Adapter Cable 5.12 WLAN Accessories: Frequency Convertors 1.1 History of WLANs 5.13 WLAN Accessories: Bandwidth Control Units 1.2 Today’s WLAN Standards 5.14 WLAN Accessories: Test Kits 1.3 Applications of WLAN Chapter-6 Wireless LAN Organizations and Standards Chapter-2 Radio Frequency (RF) Fundamentals 6.1 FCC, ISM & UNII Bands 2.1 Concepts of RF behavior 6.2 Power Output Rules & WLAN Standards 2.2 RF Terminology 6.3 WLAN Organizations 2.3 VSWR (Voltage Standing Wave Ratio) 2.4 Line of Sight Chapter-7 802.11 Network Architecture 2.5 Calculating Power 7.1 Locating a Wireless LAN Chapter-3 Spread Spectrum Technology 7.2 SSIDs 7.3 Beacons 3.1 Spread Spectrum and its applications 7.4 WLAN Scanning 3.2 Spread Spectrum Technology: FHSS 7.5 Authentication & Association 3.3 Spread Spectrum Technology: DSSS 7.6 WLAN Authentication Methods 3.4 Comparing FHSS vs. DSSS 7.7 Emerging Wireless Security Solutions 7.8 Service Sets Chapter-4 Wireless LAN Infrastructure Devices 7.9 Roaming 7.10 VPN Solutions 4.1 Wireless LAN Infrastructure devices 7.11 Power Management Features 4.2 Access Point Options 4.3 Configuration & Management Chapter-8 MAC & Physical Layers 4.4 Wireless Bridge 4.5 Wireless Workgroup Bridge 8.1 Wireless LAN Frames vs. Ethernet Frames 4.6 Wireless LAN client devices 8.2 Collision Handling 4.7 Wireless LAN gateway devices 8.3 Fragmentation 8.4 Dynamic Rate Shifting Chapter-5 Antennas and Accessories 8.5 Distributed Coordination Function 8.6 Inter-Frame Spacing 5.1 RF Antenna Types 8.7 Slot Time 5.2 RF Antenna Concepts 8.8 Communication Process 5.3 RF Antenna Installation 8.9 RTS / CTS 5.4 PoE Devices 8.10 Configuring RTS / CTS 5.5 WLAN Accessories: Amplifiers 8.11 Modulation 5.6 WLAN Accessories: Attenuators 5.7 WLAN Accessories: Lightening Arrestors 5.8 WLAN Accessories: RF Splitters 5.9 WLAN Accessories: RF Connectors 5.10 WLAN Accessories: RF Cables www.itttc.net Chapter-9 Troubleshooting Wireless LAN Installations 10.7 Emerging Security Solutions x WEP Key Management 9.1 Multipath x Wireless VPNs 9.2 Troubleshooting Multipath x TKIP 9.3 Solutions for Multipath x AES Based Solutions 9.4 Hidden Node x Wireless Gateways x x 802.1x & EAP Solutions to Hidden Node Problem 9.5 Near / Far 9.6 System throughput 10.8 Corporate Security Policy 9.7 Co-location 10.9 Security Recommendations 9.8 Types of Interference x Narrow band Interference x All band interference x RF Signal Degradation & Interference 11.1 What is a Site Survey? x Adjacent Channel & Co-Channel Interference 11.2 Preparing for a Site Survey 9.9 Range Considerations Chapter-11 Site Survey Fundamentals 11.3 Site Survey Equipment 11.4 Conducting a Site Survey Chapter-10 WLAN Security 11.5 Site Survey Reporting 10.1 WLAN Security IEEE 802.16 WIMAX Technology 10.2 WEP (Wired Equivalent Privacy) 10.3 Solutions to WEP Weakness x WIMAX Overview x WEP Keys x Introduction to WIMAX x Static WEP Keys x How WIMAX Works x Centralized Key Server x What can WIMAX do x WIMAX Cost x WIMAX Scenario 10.4 AES (Advanced Encryption Standard) 10.5 Filtering x By SSID x By MAC Address 802.11n Overview x x By Protocol x 802.11n MIMO x 802.11n Linksys Products IEEE 802.11n Standard 10.6 Attacks on WLANs x Passive x Active x Jamming x Man in the Middle www.itttc.net Wimax & 802.11n Products x WLAN Scanning x Emerging Wireless Security Solutions x D-Link Range Boosters x VPN Solutions x D-Link Power over Ethernet (PoE) x Power Management Features x D-Link WIFI Phone x Dynamic Rate Shifting x D-Link VoIP Router x RTS / CTS x D-Link Wireless Router x Modulation x D-Link MIMO Devices x Multipath x Proxim WIMAX x Hidden Node x Solectek WIMAX x WEP x Passive Attacks on Wireless LANs x WEP Key Management x Site Survey Equipment Linksys Products Demo and Wireless LAN Policy x Linksys Products Description x Linksys Products Demo x Configuring Wireless LAN Policy in Server 2003 CWNA Wireless LAN Labs CWNA Additional Features x Wireless LAN Articles x CWNA Labs x Wireless E-Books x Today’s WLAN Standards x Linksys Products x Concepts of RF behavior x Wireless Tools (Netstumbler) x Comparing FHSS vs. DSSS x Access Point Options x Wireless Bridge x Wireless Workgroup Bridge x Wireless LAN client devices x Wireless LAN gateway devices x RF Antenna Types x PoE Devices x WLAN Accessories: Amplifiers x WLAN Accessories: Attenuators x WLAN Accessories: Lightening Arrestors x WLAN Accessories: RF Splitters x WLAN Accessories: RF Connectors x WLAN Accessories: RF Cables x WLAN Accessories: RF Pigtail Adapter Cable x WLAN Accessories: Frequency Convertors x WLAN Accessories: Bandwidth Control Units x WLAN Accessories: Test Kits x WLAN Organizations www.itttc.net www.itttc.net