جستجو برای "{{term}}"
جستجو برای "{{term}}" نتیجه ای نداشت.
پیشنهاد می شود:
  • از املای صحیح کلمات مطمئن شوید.
  • از کلمات کمتری استفاده کنید.
  • فقط کلمه کلیدی عبارت مورد نظر خود را جستجو کنید.
{{count()}} نتیجه پیدا شد. برای دیدن نتایج روی دکمه های زیر کلیک کنید!
نتیجه ای یافت نشد.
سایر نتیجه ها (دپارتمان ها، اخبار، مقالات، صفحات) را بررسی کنید.

{{item.title}}

{{item.caption}}
نتیجه ای یافت نشد.
سایر نتیجه ها (دوره ها، اخبار، مقالات، صفحات) را بررسی کنید.

{{item.title}}

{{item.caption}}
نتیجه ای یافت نشد.
سایر نتیجه ها (دوره ها، دپارتمان ها، مقالات، صفحات) را بررسی کنید.

{{item.title}}

{{item.caption}}
{{item.datetime}}
نتیجه ای یافت نشد.
سایر نتیجه ها (دوره ها، دپارتمان ها، اخبار، صفحات) را بررسی کنید.

{{item.title}}

{{item.caption}}
{{item.datetime}}
نتیجه ای یافت نشد.
سایر نتیجه ها (دوره ها، دپارتمان ها، اخبار، مقالات) را بررسی کنید.

{{item.title}}

{{item.caption}}
{{item.datetime}}

سرفصل MCSA PACK 2019

Network & Security

 

MCSA PACK 2019

  Key Knowledge Areas
Introduction
  • Overview of networking
  • Overview of workgroup
  • Overview of domain
  • Overview of client
  • Overview of server
Protocols and ports
  • Overview of Protocols and ports
  • Overview of Protocol types
  • Overview of SSH
  • Overview of DNS
  • Overview of SMTP
  • Overview of FTP
  • Overview of TFTP
  • Overview of TELNET
  • Overview of DHCP
  • Overview of HTTP
  • Overview of HTTPS
  • Overview of SNMP
  • Overview of RDP
  • Overview of NTP
  • Overview of SIP
  • Overview of SMB
  • Overview of POP3
  • Overview of IMAP4
  • Overview of ICMP
  • Overview of UDP
  • Overview of TCP
  • Overview of IP
  • Overview of HTTPS
  • Overview of HTTP
  • Overview of Connection-oriented vs. connectionless
  • Overview of port number classification
Devices, Applications, Protocols, and Services at Each OSI Layers
  • Overview of OSI model
  • Overview of Layer 7
  • Overview of Layer 6
  • Overview of Layer 5
  • Overview of Layer 4
  • Overview of Layer 3
  • Overview of Layer 2
  • Overview of Layer 1
Devices, Applications, Protocols, and Services at Each TCP/IP Layers
  • Overview of TCP/IP model
  • Overview of Layer 1
  • Overview of Layer 2
  • Overview of Layer 3
  • Overview of Layer 4 / 5
Concepts and Characteristics of Routing and Switching
  • Overview of network traffic
  • Overview of Broadcast domains
  • Overview of CSMA/CD
  • Overview of CSMA/CA
  • Overview of Collision domains
  • Overview of Protocol data units
  • Overview of MTU
  • Overview of Broadcast
  • Overview of Multicast
  • Overview of Unicast
  • Overview of Segmentation and interface properties
  • Overview of ARP table
  • Overview of Routing
  • Overview of Routing
  • protocols
  • Overview of Distance-vector routing
  • protocols
  • Overview of Link-state routing protocols
  • Overview of Routing types
  • Overview of Static
  • Overview of Dynamic
  • Overview of QoS
  • Overview of NAT/PAT
Internet Protocol Addressing
  • Overview of NIC
  • Overview of MAC address
  • Overview of Private vs. public
  • Overview of Loopback and Apipa
  • Overview of Default gateway
  • Overview of Subnet mask
  • Overview of Subnetting
  • Overview of Supernetting
  • Overview of Classes A, B, C, D, and E
  • Overview of CIDR
  • Overview of Address assignments
  • Overview of DHCP
  • Overview of APIPA
  • Overview of Loopback
Compare and Contrast the Characteristics of Network Topologies, Types and Technologies
  • Overview of Wired topologies
  • Overview of Logical vs. physical
  • Overview of Star
  • Overview of Mesh
  • Overview of Bus
  • Overview of Tree
  • Overview of Hybrid
  • Overview of Ring
  • Overview of Wireless topologies
  • Overview of Ad hoc
  • Overview of Infrastructure
  • Overview of LAN
  • Overview of WLAN
  • Overview of MAN
  • Overview of WAN
  • Overview of CAN
  • Overview of SAN
  • Overview of PAN
  • Overview of 802.11
Wireless Technologies and Configurations
  • Overview of 802.11 standards:
    • a
    • b
    • g
    • n
    • ac
  • Overview of Frequencies:
    • 2.4 GHz
    • 5.0 GHz
  • Overview of Speed and distance requirements
  • Overview of Channel bandwidth
  • Overview of MIMO/MU-MIMO
  • Overview of Unidirectional/omnidirectional
Cabling
  • Overview of Media types
  • Overview of Copper
  • Overview of UTP
  • Overview of STP
  • Overview of Coaxial
  • Overview of Fiber
  • Overview of Single-mode
  • Overview of Multimode
  • Connector types
  • Overview of Copper
  • Overview of RJ-45
  • Overview of RJ-11
  • Overview of BNC
  • Overview of F-type
  • Overview of Fiber
  • Overview of LC
  • Overview of ST
  • Overview of SC
  • Overview of MTRJ
  • Overview of Transceivers
  • Overview of SFP
  • Overview of SFP+
  • Overview of QSFP
  • Overview of Characteristics of fiber transceivers
  • Overview of Half Duplex
  • Overview of Full Duplex
  • Overview of Single mode
  • Overview of Multiple mode
  • Overview of Patch panel
  • Overview of Copper cable standards
  • Overview of Cat 3
  • Overview of Cat 5
  • Overview of Cat 5e
  • Overview of Cat 6
  • Overview of Cat 6a
  • Overview of Cat 7
  • Overview of RG-6
  • Overview of RG-59
  • Overview of Copper termination standards
  • Overview of TIA/EIA 568a
  • Overview of TIA/EIA 568b
  • Overview of Crossover
  • Overview of Straight-through
  • Overview of Ethernet deployment standards
  • Overview of 100BASE-T
  • Overview of 1000BASE-T
  • Overview of 1000BASE-LX
  • Overview of 1000BASE-SX
  • Overview of 10GBASE-T
Appropriate placement of Networking devices on a network.
  • Firewall
  • Router
  • Switch
  • Hub
  • Bridge
  • Wireless access point
Networking Attacks
  • Overview of DoS
  • Overview of DDoS
  • Overview of Social engineering
  • Overview of Rogue access point
  • Overview of Phishing
  • Overview of Ransomware
  • Overview of Deauthentication
  • Overview of Brute force
  • Overview of Man-in-the-middle
  • Overview of Exploits and vulnerabilities
Configuration and Commands
  • Configuring and managing NIC by GUI
  • Configuring and managing NIC by Command
  • Configuring Networking between devices
  • ping
  • ipconfig
  • ipconfig /all
  • arp
  • getmac
  • nslookup
  • pathping
  • tracert
  • Overview and installing cisco packet tracer
  • Basic router configuration
  • Basic switch configuration
  • Capturing frames
  • Overview of Ethernet frame
Virtualization
  • Overview of Virtualization
  • Installing Hyper-V and VMware Workstation
  • Configuring and Managing Hyper-V and VMware Workstation
  • Creating Virtual Machines
  • Configuring Virtual Machines
  • Managing Virtual Machines
  • Configuring and Managing Hyper-V and VMware Workstation Storage
  • Configuring Hyper-V and VMware Workstation Networking
  • Advance Settings of Hyper-V and VMware Workstation
Installing Windows 10
  • Overview of Windows 10/11 and Workgroup
  • Navigating the User Interface
  • Comparing Different Versions and Architectures
  • Overview of Different Types of Installation
  • Installing Windows 10/11
  • Basic Configuration
  • Upgrading to Windows 10/11
Users, Groups and Profile
  • Overview of User and Built in Groups
  • Common Configuration Options
  • Managing User Accounts
  • Managing Groups
  • Managing Users and Groups by Commands
  • Creating Mass User Creation
  • Overview of Different Types of Profile
  • Managing Local Profile
Network Connectivity
  • Overview of Networking
  • Configuring IP Network Connectivity
  • Configuring Networking and Virtual Switch
  • Configuring NIC by Commands
Storage
  • Overview of Different Types of Storage
  • Managing Disks
  • Creating Basic Partitions
  • Creating Dynamic Volumes
  • Creating Virtual Hard Disks
  • Managing Partitions and Volumes
  • Managing Disks, Partitions and Volumes by Command
  • File Systems and Allocation Unit Size
  • Creating and Managing Storage Spaces and Pools
  • Advance Settings of Storage
Storage Managing Files and Printers
  • Overview of File and Printers
  • Configuring and Managing File Access
  • Configuring and Managing Shared Folders
  • Configuring and Managing Offline File
  • Configuring and Managing Work Folders
  • Configuring and Managing Printers
Implementing Group Policy
  • Overview of Local Group Policy
  • Managing Local Group Policy
  • Configuring and Managing Password Policies
  • Configuring and Managing Account Lockout Policies
  • Configuring and Managing Audit Policies
  • Configuring and Managing User Right Assignments
  • Configuring and Managing Security Options
  • Configuring and Managing Application Control Policies
  • Configuring and Managing Administrative templates Sub Policies
Managing Apps in Windows 10
  • Overview of Providing Apps to Users
  • Windows Store
  • Web Browsers
BIOS
  • Overview of Power on Self-Test
  • Overview of UEFI
  • Overview of Legacy Traditional
Security
  • Overview of Data-Related Security Threats and Access Control List (ACL)
  • Overview of Device Security
  • Overview of Using Security Settings to Mitigate Threats
  • Managing NTFS Permissions
  • Managing Share Permissions
  • Securing Data with Encryption File System (EFS)
  • Implementing and Managing BitLocker
  • Managing User Account Control
  • Overview of Network-Related Security Threats
  • Configuring and Managing Windows Firewall
  • Configuring and Managing Connection Security Rules
  • Configuring and Managing Windows Defender
Troubleshooting and Recovery
  • Overview of Devices and Drivers
  • System Image Backup
  • Recovering Files and Images
  • Restore Point
  • File History
  • Restore Point
  • Previous Version Tab
Maintaining Windows 10
  • Overview of Maintenance
  • Updating Windows
  • Monitoring Windows 10
  • Optimizing Performance
  • Performance Monitor
  • Resource Monitor
Windows Assessment Deployment Kit (WADK)
  • Overview of Windows Assessment Deployment Kit
  • Installing Windows system Image Manager
  • Creating an Answer File by WSIM
  • Applying an Answer file to an image
  • Creating WinPE by WADK
  • Managing Device by WinPE
  • Creating Image by WinPE
Remote Desktop
  • Overview of Remote Desktop
  • Configuring and Managing Remote Desktop
  • Configuring and Managing Remote Desktop Assistance
  • Advance Settings of Remote Desktop
Virtualization
  • Overview of Virtualization
  • Installing Hyper-V and VMware Workstation
  • Configuring and Managing Hyper-V and VMware Workstation
  • Creating Virtual Machines
  • Configuring Virtual Machines
  • Managing Virtual Machines
  • Configuring and Managing Hyper-V and VMware Workstation Storage
  • Configuring Hyper-V and VMware Workstation Networking
  • Advance Settings of Hyper-V and VMware Workstation
Installing, Upgrading, and Migrating servers and workloads
  • Introducing Windows Server
  • Preparing for Upgrades and Migrations
  • Upgrading Windows Server
  • Migrating Server Roles and Workloads
  • Managing Windows Server
Active Directory
  • Overview of Domain
  • Installing Active Directory Domain Services
  • Creating and Configuring Forest and Domain Controller
  • Overview of Active Directory Users and Computers
  • Managing Active Directory Container
  • Implementing and Managing OUs in Active Directory
  • Creating and Managing User Accounts in Active Directory
  • Creating and Managing Groups in Active Directory
  • Managing Computer Accounts in Active Directory
  • Managing Users by User Template
  • Configuring and Managing Additional Domain Controllers
  • Configuring and Managing Read-Only Domain Controllers
  • Configuring Additional DC and RODC by IFM
  • Performing Bulk Active Directory Operations
  • Demoting DC and Removing Metadata
  • Joining Computers to Domain GUI and Command
  • Using Offline Join
  • Introducing PowerShell in Active Directory
  • Configuring and Managing Active Directory by CMD
  • Configuring and Managing Active Directory by PowerShell
  • Advance Settings of Active Directory
  • Troubleshooting Active Directory Installations
Profile
  • Overview of profile
  • Configuring and Managing Roaming Profile
Group Policy
  • Overview of Domain Group Policy
  • Overview of Group Policy Storage, Linking, Hierarchy
  • Creating and configuring GPOs
  • administering GPOs
  • Managing Group Policy Tabs, Inheritance, Starter GPO, Copy GPO
  • Configuring and Managing WMI Filtering and Queries
  • Configuring and Managing Password Policy, Lockout Policy
  • Configuring and Managing Password Setting Object (PSO)
  • Configuring and Managing Kerberos and Audit Policy
  • Configuring and Managing User Right Assignment and Delegation
  • Configuring and Managing Security Options
  • Configuring and Managing Restricted Group, System Service
  • Configuring and Managing Firewall, App Locker
  • Configuring and Managing Software Installation
  • Overview of Policies for Group Policy
  • Configuring and Managing Loopback Processing, Replace and Merge
  • Implementing Administrative Templates
  • Configuring and Managing Group Policy Preferences
  • Planning Group Policy
  • Configuring and Managing Group Policy Modeling
  • Configuring and Managing Group Policy Results
  • Backup and Restore GPOs
Backup and Recovery
  • Overview of Backup and Restore in Windows server
  • Overview of Active Directory Backup and Restore in Windows server
  • Creating Active Directory Full and System State Backup
  • Overview of Authoritative and Non-Authoritative Recovery
  • Creating, Managing and Restoring Active Directory Snapshot
  • Managing and Restoring Recycle Bin in Active Directory
  • Changing DSRM Password
  • Using Tombstone for Recovery
Monitoring
  • Overview of Windows Server 2016 Monitoring Tools
  • Using Performance Monitor
  • Monitoring Event Logs
  • Establishing a Performance Baseline
  • Identifying the Source of a Performance Problem
  • Viewing and Configuring Centralized Event Logs
Dynamic Access Control (DAC) and NIC Teaming
  • Overview of Dynamic Access Control
  • Configuring and Managing DAC
  • Overview of NIC Teaming
  • Configuring and Managing NIC Teaming
Internet Information Services (IIS)
  • Overview of Internet Information Services (IIS)
  • Creating and Managing Web Site in IIS
  • Creating and Managing Ftp Site in IIS
  • Overview of Authentication methods
  • Configuration Authentication and Authorization
  • Creating and Managing Virtual Directory
  • Creating and Managing Application Pool
  • Managing Limits
  • Creating HTTPS Site with Self-Sign Certificate
Dynamic Host Configuration Protocol (DHCP)
  • Overview of the DHCP Role Service
  • Planning a DHCP Server Implementation
  • Installing and Configuring DHCP Server
  • Validating the DHCP Server Implementation
  • Creating and Managing Scopes and Options
  • Creating and Managing Super Scope
  • Creating and Managing Multicast Scope
  • Creating and Managing Split Scope
  • Creating and Managing Failover by Built in DHCP Failover
  • Creating and Managing DHCP Policies
  • Managing DHCP by Commands
  • Monitoring DHCP
  • Advance Settings of Dynamic Host Configuration Protocol
Domain Name Service (DNS)
  • Overview of NetBIOS Name
  • Overview of Fully Qualify Domain Name
  • Overview of DNS and WINS Servers
  • Planning DNS Name Resolution
  • Implementing DNS servers
  • Overview of Standard and Active Directory Integrated Zones
  • Overview of Forward Look up Zone and Revers Lookup Zone
  • Configuring and Managing Primary Zone
  • Creating and Managing Secondary Zone
  • Creating and Managing Stub Zone
  • Overview of Records
  • Managing A, AAAA, CNAME, PTR, MX and SRV Records
  • Managing DNS Zone Tabs
  • Managing DNS Server Tabs
  • Managing Advanced DNS Settings
  • Overview of Recursive and Iterative
  • Configuring and Managing Caching Only DNS Server
  • Configuring and Managing Root DNS Server
  • Configuring and Managing DNS Delegation
  • Configuring and Managing DNS Policies
  • Configuring and Managing Global Name Zone
  • Configuring and Managing Forwarder and Conditional Forwarder
  • Configuring and Managing Advance Round Robin by PowerShell and Policies
  • Overview of DNS Threats and Mitigations
  • Securing DNS Server
  • Troubleshooting DNS
  • Advance Settings of Domain Name Service
Internet Protocol Address Management (IPAM)
  • Overview of IPAM
  • Deploying IPAM
  • Installing and Configuring IPAM Server
  • Managing IP Address Spaces and Blocks by Using IPAM
  • Managing DHCP Servers by Using IPAM
  • Managing DNS Servers by Using IPAM
  • Advance Settings of Internet Protocol Address Management
Routing and Remote Access Server (RRAS)
  • Overview of Routing and Remote Access in Windows Server
  • Implementing Network Address Translation (NAT)
  • Overview of Routing
  • Configuring and Managing Server as a Router
  • Configuring Static Route
  • Configuring Dynamic Routing Protocol
  • Overview of Virtual Private Network (VPN)
  • Overview of VPN Tunneling Protocols
  • Overview of VPN Authentication Protocols
  • Configuring and Managing VPN Remote Access
  • Configuring and Managing VPN Site to Site
  • Configuring and Managing Radius Server
  • Configuring and Managing NPS Server
  • Configuring and Managing DHCP Relay Agent
  • Advance Settings of Routing and Remote Access Server
File Server Resource Manager (FSRM)
  • Overview of Disk Quota
  • Configuring and Managing Disk Quota
  • Overview of File Server Resource Manager (FSRM)
  • Configuring and Managing Folder Quota
  • Configuring and Managing a File screening to a Volume or Folder
  • Configuring and Managing Storage Reports Management
  • Managing Quota and File Screening Templates
  • Advance Settings of File Server Resource Manager
Distributed File System (DFS) and DFS-Replication
  • Overview of Distributed File System (DFS) and DFS-Replication
  • Configuring and Managing DFS Namespaces
  • Configuring and Managing DFS Replication
  • Managing DFS Replication Groups
  • Configuring Advance Tabs of DFS
Server Core or Nano
  • Overview of Server Core
  • Installing Server Core
  • Managing Server Core
  • Configuring Server Core
  • Using CMD and PowerShell to Configure Server Core
  • Using Remote Access to Configure Server Core
  • Installing Active Directory on a Server Core
  • Configuring and Managing Server Core as a Domain Controller
  • Configuring and Managing Server Core as an Additional Domain Controller
  • Configuring and Managing Server Core as a Read Only Domain Controller
  • Overview of Nano Server
  • Preparing and Creating Nano Server
  • Installing Nano Server
  • Managing Nano server by Remote PowerShell
  • Managing Nano server by Remote Server Manager
  • Using Offline Join to Join Nano Server
Service Account
  • Overview of Service Account
  • Managing Service Accounts
  • Creating and Managing Standalone Managed Service Account (sMSA)
  • Creating and Managing Group Managed Service Account (gMSA)
  • Creating and Managing Virtual Group Service Account
BranchCache
  • Overview of BranchCache
  • Planning for BranchCache Design
  • Creating and Managing Distributed
  • Creating and Managing Hosted cache modes
  • Troubleshoot BranchCache
  • Advance Settings of BranchCache
Active Directory Domain and Trust (ADDT)
  • Overview of Root Tree Domains and Child Domains
  • Configuring and Managing Child Domain Controllers
  • Configuring and Managing Root Tree Domain Controllers in the Same Forest
  • Overview of Forest, External, Realm, Parent-Child, Root Tree Domain and Shortcut Trusts
  • Configuring and Managing Forest, External, Realm, and Shortcut Trusts
  • Configuring and Managing Forest-Wide Authentication and Selective authorization
  • Configuring and Managing SID Filtering
  • Configuring and Managing Name Suffix Routing
  • Advance Settings of Active Directory Domain and Trust
Active Directory Site and service (ADSS)
  • Overview of Active Directory Domain Controllers Replication
  • Configuring and Managing Active Directory Sites
  • Configuring and Managing Active Directory Subnets
  • Configuring and Managing Site Links
  • Overview of Knowledge Consistency Checker
  • Configuring and Managing Replication Topology
  • Overview of Active Directory Partitions
  • Configuring and Managing AD DS Intra-Site Replication
  • Configuring and Managing AD DS Inter-Site Replication
  • Creating and Managing Site Link Bridges
  • Manage Registration of SRV Records
  • Managing Replication by Command
  • Monitoring and Troubleshooting ADDS Replication
  • Advance Settings of Active Directory Site and service
Active Directory Certificate Service (ADCS)
  • Overview of Encryption
  • Overview of Symmetric and Asymmetric Encryption
  • Overview of Certificate and Digital Signature
  • Overview of ADCS Role Service
  • Choosing between a standalone and an enterprise CA
  • Choosing between a root and a subordinate CA
  • Overview of different role Service of ADCS
  • Installing and Configuring Certificate Authority
  • Configuring and Managing Online Root and Subordinate CAs
  • Installing and Configuring Offline Root and Subordinate CAs
  • Configuring and Managing Certificate Templates
  • Enrolling Certificate Manually
  • Auto Enrolling Certificate by GPO
  • Installing and Configuring CA Web Enrollment Role Service
  • Enrolling Certificate by using CA Web Enrollment
  • Exporting and Importing Certificates
  • Using Internal CA for Publishing a HTTPS Web Site
  • Using Internal CA for Publishing a HTTPS Web Site
  • Configuring and Managing CRL and CDP
  • Configuring and Managing and manage key archival and recovery
  • Installing and Configuring Online Responder Role Service
  • Managing Online Responder
  • Configuring CA Backup and Recovery
  • Troubleshooting and Maintaining CAs
  • Advance Settings of Active Directory Certificate Service
DNS Security
  • Overview of DNS Threats and Vulnerabilities
  • Overview of DNSSEC
  • Configuring and Managing DNSSEC
Active Directory Rights Management Services (ADRMS)
  • Overview of ADRMS
  • Installing ADRMS
  • Configuring and Managing ADRMS
  • Configuring and Managing Rights Policy Templates
  • Configuring and Managing Exclusion Policies
  • Configuring and Managing Security Policies
  • ADRMS Backup and Restore
  • Configuring Client Side to Use ADRMS
  • Using ADRMS on Clients to Protect Data
  • Advance Settings of Active Directory Rights Management Services
Storage and Share
  • Overview of SMB and NFS
  • Configuring and Managing Share Folders
  • Overview of DAS, NAS, and SANs
  • Comparing Fiber Channel, iSCSI, and Fiber Channel over Ethernet
  • Understanding iSNS, DCB, and MPIO
  • Planning Storage Requirements
  • Configuring and Managing iSCSI Target Server
  • Overview of Storage Replica
  • Configuring and Managing Storage Replica
  • Overview of Data Deduplication
  • Configuring and Managing Data Deduplication for General Usage
Failover Clustering
  • Overview of Failover Cluster
  • Planning a Failover Cluster
  • Configuring and Managing Failover Cluster
  • Configuring and Managing Cluster Networking
  • Configuring and Managing Cluster Storage
  • Configuring and optimizing Clustered Shared Volumes (CSVs)
  • Configuring and Managing Quorum
  • Configuring and Managing Failover Cluster for DHCP
  • Configuring and Managing Failover Cluster for File Server
  • Verifying High Availability
  • Maintaining and Troubleshooting Failover Cluster
  • Advance Settings of Failover Cluster
Network Load Balancing (NLB)
  • Overview of NLB
  • Configuring NLB Cluster
  • Planning NLB Implementation
  • Configuring and Managing the NLB Cluster
  • Managing Cluster Operation Modes
  • Managing Cluster Filtering Modes
  • Validating High Availability for NLB Cluster
Flexible Single Master Operations (FSMO) and Functional Levels
  • Overview of Flexible Single Master Operations
  • Managing Domain Naming and Schema Operation Master Roles
  • Configuring and Managing RID, PDC and Infrastructure Operation Master Roles
  • Transferring Operation Master Roles GUI
  • Transferring Operation Master Roles Command
  • Seizing Operation Master Roles
  • Overview of Domain and Forest Functional Level
  • Managing Domain Functional Level
  • Managing Forest Functional Level
Nested Groups and Renaming Domain Controller Name
  • Overview of Active Directory Nested Groups
  • Managing Universal, Global and Local Groups
  • Managing Security and Distribution Groups
  • Overview of Renaming Domain Controller Name
  • Renaming Domain Controller Name
WSUS/WDS/VDI … Optional