Introduction |
- Overview of networking
- Overview of workgroup
- Overview of domain
- Overview of client
- Overview of server
|
Protocols and ports |
- Overview of Protocols and ports
- Overview of Protocol types
- Overview of SSH
- Overview of DNS
- Overview of SMTP
- Overview of FTP
- Overview of TFTP
- Overview of TELNET
- Overview of DHCP
- Overview of HTTP
- Overview of HTTPS
- Overview of SNMP
- Overview of RDP
- Overview of NTP
- Overview of SIP
- Overview of SMB
- Overview of POP3
- Overview of IMAP4
- Overview of ICMP
- Overview of UDP
- Overview of TCP
- Overview of IP
- Overview of HTTPS
- Overview of HTTP
- Overview of Connection-oriented vs. connectionless
- Overview of port number classification
|
Devices, Applications, Protocols, and Services at Each OSI Layers |
- Overview of OSI model
- Overview of Layer 7
- Overview of Layer 6
- Overview of Layer 5
- Overview of Layer 4
- Overview of Layer 3
- Overview of Layer 2
- Overview of Layer 1
|
Devices, Applications, Protocols, and Services at Each TCP/IP Layers |
- Overview of TCP/IP model
- Overview of Layer 1
- Overview of Layer 2
- Overview of Layer 3
- Overview of Layer 4 / 5
|
Concepts and Characteristics of Routing and Switching |
- Overview of network traffic
- Overview of Broadcast domains
- Overview of CSMA/CD
- Overview of CSMA/CA
- Overview of Collision domains
- Overview of Protocol data units
- Overview of MTU
- Overview of Broadcast
- Overview of Multicast
- Overview of Unicast
- Overview of Segmentation and interface properties
- Overview of ARP table
- Overview of Routing
- Overview of Routing
- protocols
- Overview of Distance-vector routing
- protocols
- Overview of Link-state routing protocols
- Overview of Routing types
- Overview of Static
- Overview of Dynamic
- Overview of QoS
- Overview of NAT/PAT
|
Internet Protocol Addressing |
- Overview of NIC
- Overview of MAC address
- Overview of Private vs. public
- Overview of Loopback and Apipa
- Overview of Default gateway
- Overview of Subnet mask
- Overview of Subnetting
- Overview of Supernetting
- Overview of Classes A, B, C, D, and E
- Overview of CIDR
- Overview of Address assignments
- Overview of DHCP
- Overview of APIPA
- Overview of Loopback
|
Compare and Contrast the Characteristics of Network Topologies, Types and Technologies |
- Overview of Wired topologies
- Overview of Logical vs. physical
- Overview of Star
- Overview of Mesh
- Overview of Bus
- Overview of Tree
- Overview of Hybrid
- Overview of Ring
- Overview of Wireless topologies
- Overview of Ad hoc
- Overview of Infrastructure
- Overview of LAN
- Overview of WLAN
- Overview of MAN
- Overview of WAN
- Overview of CAN
- Overview of SAN
- Overview of PAN
- Overview of 802.11
|
Wireless Technologies and Configurations |
- Overview of 802.11 standards:
- Overview of Frequencies:
- Overview of Speed and distance requirements
- Overview of Channel bandwidth
- Overview of MIMO/MU-MIMO
- Overview of Unidirectional/omnidirectional
|
Cabling |
- Overview of Media types
- Overview of Copper
- Overview of UTP
- Overview of STP
- Overview of Coaxial
- Overview of Fiber
- Overview of Single-mode
- Overview of Multimode
- Connector types
- Overview of Copper
- Overview of RJ-45
- Overview of RJ-11
- Overview of BNC
- Overview of F-type
- Overview of Fiber
- Overview of LC
- Overview of ST
- Overview of SC
- Overview of MTRJ
- Overview of Transceivers
- Overview of SFP
- Overview of SFP+
- Overview of QSFP
- Overview of Characteristics of fiber transceivers
- Overview of Half Duplex
- Overview of Full Duplex
- Overview of Single mode
- Overview of Multiple mode
- Overview of Patch panel
- Overview of Copper cable standards
- Overview of Cat 3
- Overview of Cat 5
- Overview of Cat 5e
- Overview of Cat 6
- Overview of Cat 6a
- Overview of Cat 7
- Overview of RG-6
- Overview of RG-59
- Overview of Copper termination standards
- Overview of TIA/EIA 568a
- Overview of TIA/EIA 568b
- Overview of Crossover
- Overview of Straight-through
- Overview of Ethernet deployment standards
- Overview of 100BASE-T
- Overview of 1000BASE-T
- Overview of 1000BASE-LX
- Overview of 1000BASE-SX
- Overview of 10GBASE-T
|
Appropriate placement of Networking devices on a network. |
- Firewall
- Router
- Switch
- Hub
- Bridge
- Wireless access point
|
Networking Attacks |
- Overview of DoS
- Overview of DDoS
- Overview of Social engineering
- Overview of Rogue access point
- Overview of Phishing
- Overview of Ransomware
- Overview of Deauthentication
- Overview of Brute force
- Overview of Man-in-the-middle
- Overview of Exploits and vulnerabilities
|
Configuration and Commands |
- Configuring and managing NIC by GUI
- Configuring and managing NIC by Command
- Configuring Networking between devices
- ping
- ipconfig
- ipconfig /all
- arp
- getmac
- nslookup
- pathping
- tracert
- Overview and installing cisco packet tracer
- Basic router configuration
- Basic switch configuration
- Capturing frames
- Overview of Ethernet frame
|
Virtualization |
- Overview of Virtualization
- Installing Hyper-V and VMware Workstation
- Configuring and Managing Hyper-V and VMware Workstation
- Creating Virtual Machines
- Configuring Virtual Machines
- Managing Virtual Machines
- Configuring and Managing Hyper-V and VMware Workstation Storage
- Configuring Hyper-V and VMware Workstation Networking
- Advance Settings of Hyper-V and VMware Workstation
|
Installing Windows 10 |
- Overview of Windows 10/11 and Workgroup
- Navigating the User Interface
- Comparing Different Versions and Architectures
- Overview of Different Types of Installation
- Installing Windows 10/11
- Basic Configuration
- Upgrading to Windows 10/11
|
Users, Groups and Profile |
- Overview of User and Built in Groups
- Common Configuration Options
- Managing User Accounts
- Managing Groups
- Managing Users and Groups by Commands
- Creating Mass User Creation
- Overview of Different Types of Profile
- Managing Local Profile
|
Network Connectivity |
- Overview of Networking
- Configuring IP Network Connectivity
- Configuring Networking and Virtual Switch
- Configuring NIC by Commands
|
Storage |
- Overview of Different Types of Storage
- Managing Disks
- Creating Basic Partitions
- Creating Dynamic Volumes
- Creating Virtual Hard Disks
- Managing Partitions and Volumes
- Managing Disks, Partitions and Volumes by Command
- File Systems and Allocation Unit Size
- Creating and Managing Storage Spaces and Pools
- Advance Settings of Storage
|
Storage Managing Files and Printers |
- Overview of File and Printers
- Configuring and Managing File Access
- Configuring and Managing Shared Folders
- Configuring and Managing Offline File
- Configuring and Managing Work Folders
- Configuring and Managing Printers
|
Implementing Group Policy |
- Overview of Local Group Policy
- Managing Local Group Policy
- Configuring and Managing Password Policies
- Configuring and Managing Account Lockout Policies
- Configuring and Managing Audit Policies
- Configuring and Managing User Right Assignments
- Configuring and Managing Security Options
- Configuring and Managing Application Control Policies
- Configuring and Managing Administrative templates Sub Policies
|
Managing Apps in Windows 10 |
- Overview of Providing Apps to Users
- Windows Store
- Web Browsers
|
BIOS |
- Overview of Power on Self-Test
- Overview of UEFI
- Overview of Legacy Traditional
|
Security |
- Overview of Data-Related Security Threats and Access Control List (ACL)
- Overview of Device Security
- Overview of Using Security Settings to Mitigate Threats
- Managing NTFS Permissions
- Managing Share Permissions
- Securing Data with Encryption File System (EFS)
- Implementing and Managing BitLocker
- Managing User Account Control
- Overview of Network-Related Security Threats
- Configuring and Managing Windows Firewall
- Configuring and Managing Connection Security Rules
- Configuring and Managing Windows Defender
|
Troubleshooting and Recovery |
- Overview of Devices and Drivers
- System Image Backup
- Recovering Files and Images
- Restore Point
- File History
- Restore Point
- Previous Version Tab
|
Maintaining Windows 10 |
- Overview of Maintenance
- Updating Windows
- Monitoring Windows 10
- Optimizing Performance
- Performance Monitor
- Resource Monitor
|
Windows Assessment Deployment Kit (WADK) |
- Overview of Windows Assessment Deployment Kit
- Installing Windows system Image Manager
- Creating an Answer File by WSIM
- Applying an Answer file to an image
- Creating WinPE by WADK
- Managing Device by WinPE
- Creating Image by WinPE
|
Remote Desktop |
- Overview of Remote Desktop
- Configuring and Managing Remote Desktop
- Configuring and Managing Remote Desktop Assistance
- Advance Settings of Remote Desktop
|
Virtualization |
- Overview of Virtualization
- Installing Hyper-V and VMware Workstation
- Configuring and Managing Hyper-V and VMware Workstation
- Creating Virtual Machines
- Configuring Virtual Machines
- Managing Virtual Machines
- Configuring and Managing Hyper-V and VMware Workstation Storage
- Configuring Hyper-V and VMware Workstation Networking
- Advance Settings of Hyper-V and VMware Workstation
|
Installing, Upgrading, and Migrating servers and workloads |
- Introducing Windows Server
- Preparing for Upgrades and Migrations
- Upgrading Windows Server
- Migrating Server Roles and Workloads
- Managing Windows Server
|
Active Directory |
- Overview of Domain
- Installing Active Directory Domain Services
- Creating and Configuring Forest and Domain Controller
- Overview of Active Directory Users and Computers
- Managing Active Directory Container
- Implementing and Managing OUs in Active Directory
- Creating and Managing User Accounts in Active Directory
- Creating and Managing Groups in Active Directory
- Managing Computer Accounts in Active Directory
- Managing Users by User Template
- Configuring and Managing Additional Domain Controllers
- Configuring and Managing Read-Only Domain Controllers
- Configuring Additional DC and RODC by IFM
- Performing Bulk Active Directory Operations
- Demoting DC and Removing Metadata
- Joining Computers to Domain GUI and Command
- Using Offline Join
- Introducing PowerShell in Active Directory
- Configuring and Managing Active Directory by CMD
- Configuring and Managing Active Directory by PowerShell
- Advance Settings of Active Directory
- Troubleshooting Active Directory Installations
|
Profile |
- Overview of profile
- Configuring and Managing Roaming Profile
|
Group Policy |
- Overview of Domain Group Policy
- Overview of Group Policy Storage, Linking, Hierarchy
- Creating and configuring GPOs
- administering GPOs
- Managing Group Policy Tabs, Inheritance, Starter GPO, Copy GPO
- Configuring and Managing WMI Filtering and Queries
- Configuring and Managing Password Policy, Lockout Policy
- Configuring and Managing Password Setting Object (PSO)
- Configuring and Managing Kerberos and Audit Policy
- Configuring and Managing User Right Assignment and Delegation
- Configuring and Managing Security Options
- Configuring and Managing Restricted Group, System Service
- Configuring and Managing Firewall, App Locker
- Configuring and Managing Software Installation
- Overview of Policies for Group Policy
- Configuring and Managing Loopback Processing, Replace and Merge
- Implementing Administrative Templates
- Configuring and Managing Group Policy Preferences
- Planning Group Policy
- Configuring and Managing Group Policy Modeling
- Configuring and Managing Group Policy Results
- Backup and Restore GPOs
|
Backup and Recovery |
- Overview of Backup and Restore in Windows server
- Overview of Active Directory Backup and Restore in Windows server
- Creating Active Directory Full and System State Backup
- Overview of Authoritative and Non-Authoritative Recovery
- Creating, Managing and Restoring Active Directory Snapshot
- Managing and Restoring Recycle Bin in Active Directory
- Changing DSRM Password
- Using Tombstone for Recovery
|
Monitoring |
- Overview of Windows Server 2016 Monitoring Tools
- Using Performance Monitor
- Monitoring Event Logs
- Establishing a Performance Baseline
- Identifying the Source of a Performance Problem
- Viewing and Configuring Centralized Event Logs
|
Dynamic Access Control (DAC) and NIC Teaming |
- Overview of Dynamic Access Control
- Configuring and Managing DAC
- Overview of NIC Teaming
- Configuring and Managing NIC Teaming
|
Internet Information Services (IIS) |
- Overview of Internet Information Services (IIS)
- Creating and Managing Web Site in IIS
- Creating and Managing Ftp Site in IIS
- Overview of Authentication methods
- Configuration Authentication and Authorization
- Creating and Managing Virtual Directory
- Creating and Managing Application Pool
- Managing Limits
- Creating HTTPS Site with Self-Sign Certificate
|
Dynamic Host Configuration Protocol (DHCP) |
- Overview of the DHCP Role Service
- Planning a DHCP Server Implementation
- Installing and Configuring DHCP Server
- Validating the DHCP Server Implementation
- Creating and Managing Scopes and Options
- Creating and Managing Super Scope
- Creating and Managing Multicast Scope
- Creating and Managing Split Scope
- Creating and Managing Failover by Built in DHCP Failover
- Creating and Managing DHCP Policies
- Managing DHCP by Commands
- Monitoring DHCP
- Advance Settings of Dynamic Host Configuration Protocol
|
Domain Name Service (DNS) |
- Overview of NetBIOS Name
- Overview of Fully Qualify Domain Name
- Overview of DNS and WINS Servers
- Planning DNS Name Resolution
- Implementing DNS servers
- Overview of Standard and Active Directory Integrated Zones
- Overview of Forward Look up Zone and Revers Lookup Zone
- Configuring and Managing Primary Zone
- Creating and Managing Secondary Zone
- Creating and Managing Stub Zone
- Overview of Records
- Managing A, AAAA, CNAME, PTR, MX and SRV Records
- Managing DNS Zone Tabs
- Managing DNS Server Tabs
- Managing Advanced DNS Settings
- Overview of Recursive and Iterative
- Configuring and Managing Caching Only DNS Server
- Configuring and Managing Root DNS Server
- Configuring and Managing DNS Delegation
- Configuring and Managing DNS Policies
- Configuring and Managing Global Name Zone
- Configuring and Managing Forwarder and Conditional Forwarder
- Configuring and Managing Advance Round Robin by PowerShell and Policies
- Overview of DNS Threats and Mitigations
- Securing DNS Server
- Troubleshooting DNS
- Advance Settings of Domain Name Service
|
Internet Protocol Address Management (IPAM) |
- Overview of IPAM
- Deploying IPAM
- Installing and Configuring IPAM Server
- Managing IP Address Spaces and Blocks by Using IPAM
- Managing DHCP Servers by Using IPAM
- Managing DNS Servers by Using IPAM
- Advance Settings of Internet Protocol Address Management
|
Routing and Remote Access Server (RRAS) |
- Overview of Routing and Remote Access in Windows Server
- Implementing Network Address Translation (NAT)
- Overview of Routing
- Configuring and Managing Server as a Router
- Configuring Static Route
- Configuring Dynamic Routing Protocol
- Overview of Virtual Private Network (VPN)
- Overview of VPN Tunneling Protocols
- Overview of VPN Authentication Protocols
- Configuring and Managing VPN Remote Access
- Configuring and Managing VPN Site to Site
- Configuring and Managing Radius Server
- Configuring and Managing NPS Server
- Configuring and Managing DHCP Relay Agent
- Advance Settings of Routing and Remote Access Server
|
File Server Resource Manager (FSRM) |
- Overview of Disk Quota
- Configuring and Managing Disk Quota
- Overview of File Server Resource Manager (FSRM)
- Configuring and Managing Folder Quota
- Configuring and Managing a File screening to a Volume or Folder
- Configuring and Managing Storage Reports Management
- Managing Quota and File Screening Templates
- Advance Settings of File Server Resource Manager
|
Distributed File System (DFS) and DFS-Replication |
- Overview of Distributed File System (DFS) and DFS-Replication
- Configuring and Managing DFS Namespaces
- Configuring and Managing DFS Replication
- Managing DFS Replication Groups
- Configuring Advance Tabs of DFS
|
Server Core or Nano |
- Overview of Server Core
- Installing Server Core
- Managing Server Core
- Configuring Server Core
- Using CMD and PowerShell to Configure Server Core
- Using Remote Access to Configure Server Core
- Installing Active Directory on a Server Core
- Configuring and Managing Server Core as a Domain Controller
- Configuring and Managing Server Core as an Additional Domain Controller
- Configuring and Managing Server Core as a Read Only Domain Controller
- Overview of Nano Server
- Preparing and Creating Nano Server
- Installing Nano Server
- Managing Nano server by Remote PowerShell
- Managing Nano server by Remote Server Manager
- Using Offline Join to Join Nano Server
|
Service Account |
- Overview of Service Account
- Managing Service Accounts
- Creating and Managing Standalone Managed Service Account (sMSA)
- Creating and Managing Group Managed Service Account (gMSA)
- Creating and Managing Virtual Group Service Account
|
BranchCache |
- Overview of BranchCache
- Planning for BranchCache Design
- Creating and Managing Distributed
- Creating and Managing Hosted cache modes
- Troubleshoot BranchCache
- Advance Settings of BranchCache
|
Active Directory Domain and Trust (ADDT) |
- Overview of Root Tree Domains and Child Domains
- Configuring and Managing Child Domain Controllers
- Configuring and Managing Root Tree Domain Controllers in the Same Forest
- Overview of Forest, External, Realm, Parent-Child, Root Tree Domain and Shortcut Trusts
- Configuring and Managing Forest, External, Realm, and Shortcut Trusts
- Configuring and Managing Forest-Wide Authentication and Selective authorization
- Configuring and Managing SID Filtering
- Configuring and Managing Name Suffix Routing
- Advance Settings of Active Directory Domain and Trust
|
Active Directory Site and service (ADSS) |
- Overview of Active Directory Domain Controllers Replication
- Configuring and Managing Active Directory Sites
- Configuring and Managing Active Directory Subnets
- Configuring and Managing Site Links
- Overview of Knowledge Consistency Checker
- Configuring and Managing Replication Topology
- Overview of Active Directory Partitions
- Configuring and Managing AD DS Intra-Site Replication
- Configuring and Managing AD DS Inter-Site Replication
- Creating and Managing Site Link Bridges
- Manage Registration of SRV Records
- Managing Replication by Command
- Monitoring and Troubleshooting ADDS Replication
- Advance Settings of Active Directory Site and service
|
Active Directory Certificate Service (ADCS) |
- Overview of Encryption
- Overview of Symmetric and Asymmetric Encryption
- Overview of Certificate and Digital Signature
- Overview of ADCS Role Service
- Choosing between a standalone and an enterprise CA
- Choosing between a root and a subordinate CA
- Overview of different role Service of ADCS
- Installing and Configuring Certificate Authority
- Configuring and Managing Online Root and Subordinate CAs
- Installing and Configuring Offline Root and Subordinate CAs
- Configuring and Managing Certificate Templates
- Enrolling Certificate Manually
- Auto Enrolling Certificate by GPO
- Installing and Configuring CA Web Enrollment Role Service
- Enrolling Certificate by using CA Web Enrollment
- Exporting and Importing Certificates
- Using Internal CA for Publishing a HTTPS Web Site
- Using Internal CA for Publishing a HTTPS Web Site
- Configuring and Managing CRL and CDP
- Configuring and Managing and manage key archival and recovery
- Installing and Configuring Online Responder Role Service
- Managing Online Responder
- Configuring CA Backup and Recovery
- Troubleshooting and Maintaining CAs
- Advance Settings of Active Directory Certificate Service
|
DNS Security |
- Overview of DNS Threats and Vulnerabilities
- Overview of DNSSEC
- Configuring and Managing DNSSEC
|
Active Directory Rights Management Services (ADRMS) |
- Overview of ADRMS
- Installing ADRMS
- Configuring and Managing ADRMS
- Configuring and Managing Rights Policy Templates
- Configuring and Managing Exclusion Policies
- Configuring and Managing Security Policies
- ADRMS Backup and Restore
- Configuring Client Side to Use ADRMS
- Using ADRMS on Clients to Protect Data
- Advance Settings of Active Directory Rights Management Services
|
Storage and Share |
- Overview of SMB and NFS
- Configuring and Managing Share Folders
- Overview of DAS, NAS, and SANs
- Comparing Fiber Channel, iSCSI, and Fiber Channel over Ethernet
- Understanding iSNS, DCB, and MPIO
- Planning Storage Requirements
- Configuring and Managing iSCSI Target Server
- Overview of Storage Replica
- Configuring and Managing Storage Replica
- Overview of Data Deduplication
- Configuring and Managing Data Deduplication for General Usage
|
Failover Clustering |
- Overview of Failover Cluster
- Planning a Failover Cluster
- Configuring and Managing Failover Cluster
- Configuring and Managing Cluster Networking
- Configuring and Managing Cluster Storage
- Configuring and optimizing Clustered Shared Volumes (CSVs)
- Configuring and Managing Quorum
- Configuring and Managing Failover Cluster for DHCP
- Configuring and Managing Failover Cluster for File Server
- Verifying High Availability
- Maintaining and Troubleshooting Failover Cluster
- Advance Settings of Failover Cluster
|
Network Load Balancing (NLB) |
- Overview of NLB
- Configuring NLB Cluster
- Planning NLB Implementation
- Configuring and Managing the NLB Cluster
- Managing Cluster Operation Modes
- Managing Cluster Filtering Modes
- Validating High Availability for NLB Cluster
|
Flexible Single Master Operations (FSMO) and Functional Levels |
- Overview of Flexible Single Master Operations
- Managing Domain Naming and Schema Operation Master Roles
- Configuring and Managing RID, PDC and Infrastructure Operation Master Roles
- Transferring Operation Master Roles GUI
- Transferring Operation Master Roles Command
- Seizing Operation Master Roles
- Overview of Domain and Forest Functional Level
- Managing Domain Functional Level
- Managing Forest Functional Level
|
Nested Groups and Renaming Domain Controller Name |
- Overview of Active Directory Nested Groups
- Managing Universal, Global and Local Groups
- Managing Security and Distribution Groups
- Overview of Renaming Domain Controller Name
- Renaming Domain Controller Name
|
WSUS/WDS/VDI … Optional |
|