ランニング Wiki

Microsoft MCSA certification obtaining MCSA certification will make you qualified to be a network or computer system administrator and a computer network expert, which is also the first step to become a Microsoft Certified Solutions expert (MCSE). - Galaxy Education - established in 2000, Galaxy education is a professional ICT vocational training institution; it is authorized training partner of Huawei, Cisco, Huasan, Microsoft, red hat, Oracle and other international manufacturers; it is international certification examination center of Purvin and Vue. In the 15 years since its establishment, more than 50000 people have participated in Galaxy related training. Galaxy education ICT courses face-to-face training, can choose Chengdu and Chongqing two campuses. Choose online - my Galaxy - "my Galaxy" is Galaxy education started in 2013. It integrates the existing teaching resources and strives to build an online education system with high-quality content and powerful functions. The public version was launched in 2015. My galaxy will provide you with a variety of learning options. With the continuous development of the Internet, online education, like online shopping, will become the first choice for most people. Cost location class hours lecturers classes ¥ 2000 Chengdu Hongxing Road Campus 60 teacher Lu and others according to the plan, please consult ¥ 800 anytime and anywhere60 Mr. Lu et al. anytime and anywhere details of MCSA certification courses installing and configuring Windows Server 2012 [401] installing and configuring servers (15 – 20%) install the server plan the server installation, plan the server role, plan the server upgrade, install the server core, optimize the resource utilization by using the on-demand function, from the early version of windows server Migrate roles configure server configure server core, delegate management, add and delete functions in offline image, deploy roles on remote server, convert between server core and full GUI, configure services, configure NIC combination, install and configure Windows shell desired state configuration (DSC) configure local storage design storage space, configure basic and dynamic disks, configure master boot record (MBR) and GUID partition table (GPT) disks; manage volumes; create and mount virtual hard disk (VHD), configure storage pool and disk pool, create storage pool using disk array configure server roles and functions (15 – 20%) profile and share access create and configure shares, configure share permissions, configure offline files, configure NTFS permissions, configure baseTo access enumeration (ABE), configure Volume Shadow Copy Service (VSS), configure NTFS quota, create and configure work folder configure print and file services configure easy print driver, configure enterprise print management, configure driver, configure printer pool, configure print priority, configure printer permissions configure server for remote management configure Winrm, configuration of lower layer server management, configuration of daily server management tasks, configuration of multi server management, configuration of server core, configuration of windows firewall, management of servers not joined in domain configuration of Hyper-V (15 – 20%) create and configure virtual machine settings configure dynamic memory, configure intelligent paging, configure resource metering, configure guest integration services, create and configure generation 1 and 2 virtual machines, configure and use enhanced session mode, configure remotefx create and configure virtual machine storage create VHD and vhdx, configure differential drive, modify VHD, configure delivery disk, manage checkpoint, implement virtual fibre channel adapter, configure storage QoS create and configure virtual network configure Hyper-V virtual switch, optimize network performance, configure MCA address, configure network isolation, configure comprehensive and old virtual network adapter, and configure NIC in virtual machine Composition deploy and configure core network services (15 – 20%) configure IPv4 and IPv6 addressingConfigure IP address options, configure IPv4 or IPv6 subnet partition, configure supernetwork partition, configure interoperability between IPv4 and IPv6, configure Station Automatic Tunnel Addressing Protocol (ISATAP), configure Teredo deploy and configure Dynamic Host Configuration Protocol (DHCP) service create and configure scope, configure DHCP reservation, configure DHCP Options, configure PXE startup of client and server, configure DHCP relay agent, DHCP server authorization deploy and configure DNS service configure Active Directory integration of primary zone, configure forwarder, configure root prompt, manage DNS cache, create a and PTR resource records install and manage active directory (15 – 20%) install domain controller Add or remove domain controller in domain, upgrade domain controller, install Active Directory Domain Services (AD DS) on server core installation, install domain controller from "install from media (IFM)", solve DNS SRV record registration problem, configure global catalog server, and deploy active directory service architecture in Microsoft azure (IAAs) create and manage active directory users and Computing automate the creation of active directory accounts; create, copy, configure and delete users and computers; configure templates; perform batch active directory operations; configure user permissions; join domains offline; manage inactive and disabled accounts create and manage active directory groups and organizational units (OU) configure group nesting; transform groups (including security, distributed, universal, domain local and domain global); use group policy to manage group membership; enumerate group membership; delegate the creation and management of active directory objects; manage default Active Directory container; create, copy, configure and delete groups and Ou reference resources Active Directory Domain Services (adds) Install new features virtualization security technology and domain controller clone overview of active directory simplified management create and manage group policy (15 – 20%) create group policy object (GPO) configure central storage, manage novice GPO, configure GPO link, configure multiple local group policies configure security policy configure user permission assignment, configure security option settings. Configure security templates, audit policies, local users and groups, user account control (UAC) configure application restriction policies configure rules enforcement, configure aPplocker rule, configure software restriction policy configure windows firewall use group policy to configure multiple profile rules; configure connection security rules; configure windows firewall to allow or deny applications, scopes, ports and users; configure authentication firewall exceptions; import and export settings administering Windows Server 2012 [411] Hide all deploy, manage, and maintain servers (15 – 20%) deploy and manage server images install windows Deployment Services (WDS) Roles; configure and manage startup, installation and discovery of images; update patches and drivers for images; install offline image functions; configure driver groups and packages implement patch management install and configure Windows Server Update Services (WSUS) roles, configure update group policies, configure client targets, configure WSUS synchronization, and configure WSUS Group, manage patch management in mixed environment monitor server configure data collector set (DCS), configure alerts, monitor real-time performance, monitor virtual machine (VM), monitor events, configure event subscription, configure network monitoring, plan performance monitoring configure file and print services (15 – 20%) configure distributed file system (DFS) install and configureDFS namespace, configure DFS replication target, configure replication plan, configure remote differential compressi on settings, configure staging, configure fault tolerance, clone DFS database, recover DFS database, optimize DFS replication configure file server resource manager (FSRM) install FSRM Role service, configuration quota, profile screening, configuration report, profile management tasks profile and disk encryption configure BitLocker? encryption, configure network unlocking function, configure BitLocker? policy, configure EFS recovery agent, manage EFS and BitLocker? certificates (including backup and restore) configure advanced audit policy use group policy and AuditPol?.exe Implement audit, create expression based audit policy, create mobile device audit policy configure network service and access (15 – 20%) configure DNS zone configure primary and secondary zone, configure stub zone, configure conditional forwarding, and set up a new audit policy in active directory Configure zone and conditional forwarding store, configure zone delegation, configure zone transport settings, configure notification settings configure DNS records create and configure DNS resource records (RR), including a, AAAA, PTR, SOA, NS, SRV, CNAME and MX records; configure zone cleaning; configure record options, including time to live (TTL))Configure dynamic update of security configure virtual private network (VPN) and routing install and configure remote access role, realize network address translation (NAT), configure VPN settings, configure remote dial in settings for users, configure routing, configure web application proxy in delivery mode configure Directaccess implements server requirements, implements client configuration, configures DNS for direct access and certificates for direct access configures network policy server (NPS) infrastructure (10 – 15%) configures network policy server configures radius server, including radius proxy; configures radius client; configures NPs template; configures radius Accounting, configuring certificate configuring NPs policy configuring connection request policy, configuring VPN client network policy (multi link and bandwidth allocation, IP filter, encryption, IP addressing); importing and exporting NPs policy configuring network access protection (NAP) configuring system health verifier (SHV), configuring health policy, configuring nap enforcement using DHCP and VPN, using DHCP For isolation and correction of computers incompatible with VPN configuration, configure nap client settings configure and manage active directory (10 – 15%) configure serverCopy verification create and configure service account, create and configure group hosting service account, configure Kerberos delegation, manage service principal name (SPN), configure virtual account configure domain controller transfer and obtain operation master role, install and configure read only domain controller (RODC), configure domain controller clone maintain active directory and backup active directory SYSVOL: manage active directory offline, optimize active directory database, clear metadata, configure Active Directory snapshot, perform object level and container level recovery, perform active directory restore, and utilize active directory Recycle bin configuration and restore object configure account policy configure domain and local user password policy setting, configure and apply password setting object (PSO), delegate password setting management, configure account locking policy setting, configure Kerberos policy setting configure and manage group policy (15 – 20%) configure group policy processing configure processing order and priority, prevent inheritance, enforce policy, security filtering and windows management instrumentation (WMI) filtering, loopback processing, and slow configuration and managementSpeed link processing and group policy caching, configure client extension (CSE) behavior, enforce group policy updates configure group policy settings configuration settings, including software installation, folder redirection, script and management template settings; import security templates; import custom management template files; configure attribute filters of management templates manage group policy objects (GPO) backup, import, copy and restore GPO; create and configure migration table; reset default GPO; delegate group policy management configure group policy preferences (GPP) configure GPP settings, including printer, network drive mapping, power options, custom registry settings, control panel settings, and Internet Explorer Setting, file and folder deployment and shortcut deployment; configuring project level goals configuring advanced Windows Server 2012 services [412] Hide all configure and manage high availability (15 – 20%) configure network load balancing (NLB) install NLB nodes and configure NLB Prerequisites, configuration dependency, configuration port rules, configuration cluster operation mode, upgrade NLB cluster configure failover cluster configure arbitration, configure cluster network, restore single node or cluster configuration, configure cluster storage, implement cluster aware update, upgrade cluster, configure and optimize cluster shared volume, configure cluster without network name, configure storage space Manage failover cluster roles configure role specific settings, including continuously available shares; configure virtual machine (VM) monitoring; configure failover and preference settings; configure guest cluster Manage VM mobility perform real-time migration; perform fast migration; perform storage migration; import, export and copy VMS; configure VMS Network health protection; clear when configuration is off configuration file and storage solution (15 – 20%) configure advanced file service configure network file system (NFS) data storage, configure branch cache, use file server resource manager (FSRM) to configure file classification infrastructure (FCI), and audit configuration file access to implement dynamic access control (DAC) configure user and device claim types, implement policy changes and temporary storage, perform access denial correction, classify configuration files, create and configure central access rules and policies, create and configure resource attributes and lists configure and optimize storage configure iSCSI targets and initiators, and configure Internet storage name server (ISNs), perform thin configuration and tailoring, use on-demand functions to manage server available space, configure hierarchical storage implement business continuity and disaster recovery (15 – 20%) configure and manage backup configure windows server backup, configure windows azure backup, configure role specific backup, and useVSSAdmin manages VSS settings recovery server restore from backup, perform bare metal restore (BMR), use windows recovery environment (win re) and secure mode recovery server, configure boot configuration data (BCD) storage configure site level fault tolerance configure Hyper-V replica, including Hyper-V replica agent and VM; configure multi site cluster, including network settings, arbitration and fail over settings; configure Hyper-V replica extended replication; configure Global Update Manager; recover multi site fail over cluster configure network services (15 – 20%) implement advanced dynamic host configuration protocol (DHCP) solution create and configure superscope and multicast scope; implement DHCPv6; configure high availability for DHCP (including DHCP failover and scope splitting); configure DHCP name protection; configure DNS registration implement advanced DNS solutions configure DNS Security, including domain name system security extension (DNSSEC), DNS socket pool and cache locking; configure DNS Log record; configure delegation management; configure recursion; configure netmask sorting; configure globalnames region; analyze region level statistics deploy and manage IPAM manually or by using group policySet IPAM, configure server recovery, create and manage IP blocks and IP ranges, monitor the usage of IP address space, migrate to IPAM, de legate IPAM management, manage IPAM collection, configure IPAM database storage configure Active Directory infrastructure (15 – 20%) configure forest or domain implement multi domain and multi forest active directory Environment, including interoperability with previous versions of Active Directory; upgrade existing domains and forests, including environment preparation and functional levels; configure multiple user principal name (UPN) suffixes configure trust configure external, forest, shortcut and domain trust; configure trust authentication; configure Sid Filter; configure name suffix routing configure sites configure sites and subnets, create and configure site links, manage site coverage, manage SRV record registration, move domain controllers between sites manage active directory and SYSVOL replication configure replication to read only domain controllers (rodcs), and configure password replication policies for rodcs (PRP), monitor and manage replication, upgrade SYSVOL replication of distributed file system replication (dfsr) configure identity and access solutions (15 – 20%) implement active directoryFederation Services (AD FS) install ad FS; implement claim based authentication, including relying party trust; configure authentication policy; configure workplace join; configure multi factor authentication install and configure Active Directory Certificate Services (AD CS) install enterprise certification authority (CA), configure certificate revocation list (CRL) Distribution point, install and configure online responders, implement management role separation, configure CA backup and recovery Manage certificate Manage certificate template; implement and manage certificate deployment, verification and revocation; manage certificate renewal; use group policy to manage certificate registration and renewal of computers and users; configure and manage key archiving and recovery install and configure active directory Rights management services (AD RMS) install authorization or certificate ad RMS server, manage ad RMS service connection point (SCP), manage RMS template, configure exclusion policy, backup and restore ad RMS <


トップ   新規 一覧 単語検索 最終更新   ヘルプ