Available courses

Course Format: online instructor lead training in a virtual class room

Language: Bulgarian (English optional)

Course Files: digital format, price included in the course

Lab environment: individual lab env. for each student.

Course Duration40 learning hours online training (theory and practice).


If lab access is not required by student, the price will be deduct. 

Payment Method: PayPal, bank transfer, cash payments, wire transfer


Invoice can be requested with a support request using our contacts page.

The Invoice is issued normally in 7 days after the payment has been confirmed. 

Additional information can be found using our contacts page.


Training Dates: please check the IT Training Calendar in the main site. 

We will contact you to confirm the dates and registration. 


At course completion

After completing this course, students will be able to:

Secure Windows Server.

Secure application development and a server workload infrastructure.

Manage security baselines.

Configure and manage just enough and just-in-time (JIT) administration.

Manage data security.

Configure Windows Firewall and a software-defined distributed firewall.

Secure network traffic.

Secure your virtualization infrastructure.

Manage malware and threats.

Configure advanced auditing.

Manage software updates.

Manage threats by using Advanced Threat Analytics (ATA) and Microsoft Operations Management Suite (OMS).


Course Outline

Module 1: Breach detection and using the Sysinternals tools

In this module, students will learn about breach detection, attack types and vectors, cybercrime, and how you can analyse your system’s activity by using the Sysinternals tool suite.

Lessons

Overview of breach detection

Using the Sysinternals tools to detect breaches

Lab : Basic breach detection and incident response strategies

Identifying attack types

Using incident-response strategies

Exploring the Sysinternals tools

After completing this course, students will be able to:

Describe breach detection.

Describe how to detect a breach by using the Sysinternals tools.

Module 2: Protecting credentials and privileged access

This module explains how you can configure user rights and security options, protect credentials by using credential guard, implement privileged-access workstations, and manage and deploy a local administrator-password solution so that you can manage passwords for local administrator accounts.

Lessons

Understanding user rights

Computer and service accounts

Protecting credentials

Understanding privileged-access workstations and jump servers

Deploying a local administrator-password solution

Lab : User rights, security options, and group-managed service accounts

Configuring security options

Configuring restricted groups

Delegating privileges

Creating and managing group managed service accounts (MSAs)

Configuring the Credential Guard feature

Locating problematic accounts

Lab : Configuring and deploying LAPs

Installing local administrator password solution (LAPs)

Configuring LAPs

Deploying LAPs

After completing this module, students will be able to:

Understand user rights.

Describe computer and service accounts.

Help protect credentials.

Understand privileged-access workstations and jump servers.

Understand how to use a local administrator-password solution.

Module 3: Limiting administrator rights with Just Enough Administration

This module explains how to deploy and configure Just Enough Administration (JEA).

Lessons

Understanding JEA

Configuring and deploying JEA

Lab : Limiting administrator privileges by using JEA

Creating a role-capability file

Creating a session-configuration file

Creating a JEA endpoint

Connecting to a JEA endpoint

Deploying JEA by using Desire State Configuration (DSC)

After completing this module, students will be able to:

Understand JEA.

Configure and deploy JEA.

Module 4: Privileged Access Management and administrative forests

This module explains the concepts of Enhanced Security Administrative Environment (ESAE) forests, Microsoft Identity Manager (MIM), and Just In Time (JIT) Administration, or Privileged Access Management.

Lessons

Understanding ESAE forests

Overview of MIM

Implementing JIT and Privileged Access Management by using MIM

Lab : Limiting administrator privileges by using Privileged Access Management

Using a layered approach to security

Exploring MIM

Configuring a MIM web portal

Configuring the Privileged Access feature

Requesting privileged access

After completing this module, students will be able to:

Understand enhanced security administrative environment forests.

Understand MIM.

Understand how to implement JIT and Privileged Access Management by using MIM.

Module 5: Mitigating malware and threats

This module explains how to configure the Windows Defender, AppLocker, and Device Guard features.

Lessons

Configuring and managing Windows Defender

Using software restricting policies (SRPs) and AppLocker

Configuring and using Device Guard

Using and deploying the Enhanced Mitigation Experience Toolkit

Lab : Securing applications by using AppLocker, Windows Defender, Device Guard Rules, and the EMET.

Configuring Windows Defender

Configuring AppLocker

Configuring and deploying Device Guard

Deploying and using EMET

After completing this module, students will be able to:

Configure and manage Windows Defender.

Use Software Restricting Policies and AppLocker.

Configure and use Device Guard.

Use and deploy the EMET.

Module 6: Analysing activity by using advanced auditing and log analytics

This module explains how to use advanced auditing and Windows PowerShell transcripts.

Lessons

Overview of auditing

Understanding advanced auditing

Configuring Windows PowerShell auditing and logging

Lab : Configuring encryption and advanced auditing

Configuring auditing of file-system access

Auditing domain logons

Managing the configuration of advanced audit policies

Windows PowerShell logging and auditing

After completing this module, students will be able to:

Understanding auditing.

Understand advanced auditing.

Audit and log Windows PowerShell.

Module 7: Analysing activity with Microsoft Advanced Threat Analytics feature and Operations Management Suite

This module explains the Microsoft Advanced Threat Analytics tool and the Microsoft Operations Management suite (OMS), and details how you can use them to monitor and analyse the security of a Windows Server deployment.

Lessons

Overview of Advanced Threat Analytics

Understanding OMS

Lab : Advanced Threat Analytics and Operations Management Suite

Using ATA and OMS

Preparing and deploying ATA

Preparing and deploying OMS

After completing this module, students will be able to:

Understand Advanced Threat Analytics.

Understand OMS.

Module 8: Securing your virtualization an infrastructure

This module explains how to configure Guarded Fabric virtual machines (VMs), including the requirements for shielded and encryption-supported VMs.

Lessons

Overview of Guarded Fabric VMs

Understanding shielded and encryption-supported VMs

Lab : Deploying and using Guarded Fabric with administrator-trusted attestation and shielded VMs

Deploying Guarded Fabric VMs with administrator-trusted attestation

Deploying a shielded VM

After completing this module, students will be able to:

Understand Guarded Fabric VMs.

Understand shielded and encryption-supported VMs.

Module 9: Securing application development and server-workload infrastructure

This module details the Security Compliance Manager, including how you can use it to configure, manage, and deploy baselines. Additionally, students will learn how to deploy and configure Nano Server, Microsoft Hyper-V, and Windows Server Containers.

Lessons

Using Security Compliance Manager

Introduction to Nano Server

Understanding containers

Lab : Using Security Compliance Manager

Configuring a security baseline for Windows Server 2016

Deploying a security baseline for Windows Server 2016

Lab : Deploying and Configuring Nano Server and containers

Deploying, managing, and securing Nano Server

Deploying, managing, and securing Windows Server containers

Deploying, managing, and securing Hyper-V containers

After completing this module, students will be able to:

Understand Security Compliance Manager.

Describe Nano Server.

Understand containers.

Module 10: Protecting data with encryption

This module explains how to configure Encrypting File System (EFS) and BitLocker drive encryption to protect data at rest.

Lessons

Planning and implementing encryption

Planning and implementing BitLocker

Lab : Configuring EFS and BitLocker

Encrypting and recovering access to encrypted files

Using BitLocker to protect data

After completing this module, students will be able to:

Plan and implement encryption.

Plan and implement BitLocker.


Module 11: Limiting access to file and folders

This module explains how to optimize file services by configuring File Server Resource Manager (FSRM) and Distributed File System (DFS). Students will learn how to protect a device’s data by using encryption or BitLocker. Students also will learn how to manage access to shared files by configuring Dynamic Access Control (DAC).

Lessons

Introduction to FSRM

Implementing classification management and file-management tasks

Understanding Dynamic Access Control (DAC)

Lab : Configuring quotas and file screening

Configuring FSRM quotas

Configuring file screening

Lab : Implementing DAC

Preparing DAC

Implementing DAC

After completing this module, students will be able to:

Understand FSRM.

Implement classification management and file-management tasks.

Understand DAC.

Module 12: Using firewalls to control network traffic flow

This module explains the firewalls that are present on Windows Server.

Lessons

Understanding Windows Firewall

Software-defined distributed firewalls

Lab : Windows Firewall with Advanced Security

Creating and testing inbound rules

Creating and testing outbound rules

After completing this module, students will be able to:

Describe Windows Firewall.

Understand software-defined distributed firewalls.

Module 13: Securing network traffic

This module explains how to secure network traffic and how to use Microsoft Message Analyzer, Server Message Block (SMB) encryption, and Domain Name System Security Extensions (DNSSEC).

Lessons

Network-related security threats and connection-security rules

Configuring advanced DNS settings

Examining network traffic with Microsoft Message Analyzer

Securing SMB traffic, and analysing SMB traffic

Lab : Connection security rules and securing DNS

Creating and testing connection security rules

Configuring and testing DNSSEC

Lab : Microsoft Message Analyzer and SMB encryption

Using Microsoft Message Analyzer

Configuring and verifying SMB encryption on SMB shares

After completing this module, students will be able to:

Understand network-related security threats and connection security rules.

Configure advanced DNS settings.

Examine network traffic with Microsoft Message Analyzer.

Secure SMB traffic, and analyze SMB traffic.

Module 14: Updating Windows Server

This module explains how to use Windows Server Update Services (WSUS) to deploy updates to Windows Servers and clients.

Lessons

Overview of WSUS

Deploying updates by using WSUS

Lab : Implementing update management

Implementing the WSUS server role

Configuring update settings

Approving and deploying an update by using WSUS

Deploying Windows Defender definition updates by using WSUS

After completing this module, students will be able to:

Understand WSUS.

Deploy updates with WSUS.


Course Format: ONLINE BOOTCAMP instructor lead training in a virtual class room (the entire course is held in one week of training, usually starts on monday and ends on friday, from 09:00am to 05:00pm, but dates and time can be adjusted according to the client needs. 

Benefits: preparation for the certification exam, new skills

Language: Bulgarian (English optional)

Course Files: digital format, price included in the course

Lab environment: individual lab env. for each student.

Course Duration40 learning hours online training (theory and practice).

Included as part of the service:

  • Online training
  • Virtual LAB access
  • Study materials - books, ebooks
  • Online Tests

If lab access is not required by student, the price will be deduct. 

Additional Information about the training content can be found on our web site - http://www.it-training.pro The ONline Training Academy

Payment Method: PayPal, bank transfer, cash payments, wire transfer


Invoice can be requested with a support request using our contacts page.

The Invoice is issued normally in 7 days after the payment has been confirmed. 

Additional information can be found using our contacts page.


Training Dates: please check the IT Training Calendar in the main site. 

We will contact you to confirm the dates and registration. 


Designed for experienced networking professionals with intermediate knowledge of the Juniper Networks Junos OS for SRX Series devices, this online training gives the candidate understanding of security technologies and related platform configuration and troubleshooting skills.


The JNCIS-SEC certification is valid for three years. 


Junos for Security Platforms (JSEC):

    • Junos Security Overview
    • Zones
    • Security Policies
    • NAT
    • IPsec VPNs
    • High Availability (HA) Clustering
    • Virtual SRX

    Junos Security Overview

    Identify concepts, general features, and functionality of Junos OS security

    Junos security architecture

    Branch vs. high-end platforms

    Major hardware components of SRX Series services gateways

    Packet flow

    Packet-based vs. session-based forwarding


    Zones

    Identify the concepts, benefits, or operation of zones

    Zone types

    Dependencies

    Host inbound packet behavior

    Screens

    Transit packet behavior

    Demonstrate knowledge of how to configure, monitor, or troubleshoot zones

    Zone configuration steps

    Hierarchy priority (Inheritance)

    Screens

    Monitoring and troubleshooting


    Security Policies

    Identify the concepts, benefits, or operation of security policies

    Policy types

    Policy components

    Policy ordering

    Host inbound traffic examination

    Transit traffic examination

    Scheduling

    Rematching

    ALGs

    Address books

    Junos Space Security Director policy management

    Applications

    Demonstrate knowledge of how to configure, monitor, or troubleshoot security policies

    Policies

    ALGs

    Address books

    Junos Space Security Director policy management

    Custom applications

    Monitoring and troubleshooting


    NAT

    Identify the concepts, benefits, or operation of NAT

    NAT types

    NAT/PAT processing

    DNS Doctoring

    Cone NAT

    IPv4 to IPv6

    Address persistence

    NAT with Junos Space Security Director

    NAT proxy ARP

    Demonstrate knowledge of how to configure, monitor, or troubleshoot NAT

    NAT configuration steps

    Monitoring and troubleshooting


    IPSec VPNs

    Identify the concepts, benefits, or operation of IPsec VPNs

    Secure VPN characteristics and components

    IPSec tunnel establishment

    IPSec traffic processing

    Group VPN

    ADVPN

    IPsec with Junos Space Security Director

    PKI

    Dynamic VPN

    Junos OS IPsec implementation options

    Demonstrate knowledge of how to configure, monitor, or troubleshoot IPsec VPNs

    IPSec VPN configuration steps

    Monitoring and troubleshooting


    High Availability (HA) Clustering

    Identify the concepts, benefits, or operation of HA

    HA features and characteristics

    Deployment requirements and considerations

    Chassis cluster characteristics and operation

    Cluster modes

    Cluster and node IDs

    Redundancy groups

    Cluster interfaces

    Real-time objects

    State synchronization

    Ethernet switching considerations

    IPSec considerations

    Manual failover

    Demonstrate knowledge of how to configure, monitor, or troubleshoot clustering

    Cluster preparation

    Cluster configuration steps

    Monitoring and troubleshooting


    Virtual SRX

    Identify concepts, general features or functionality of virtualized security using SRX

    Installation

    Clustering with vSRX

    Deployment scenarios

    Troubleshooting


    Онлайн Live Курс Linux Professional Institute LPIC-1 Course 102 System Administrator


    IT-Training Ви гарантира 100% за качеството на този курс. Ако по някаква причина обучението не отговори на очакванията ви, ние ви гарантираме възстановяване на сумата, която сте заплатили.

    Формат на курса: Онлайн, воден от инструктор, виртуална класна стая. Курсът е част от сертификационната програма на Linux Professional Institute и служи за подготовка за сертифициране за ниво LPIC-1, както и за професионално развитие като Linux System Administrator и Linux IT специалист.

    Език на курса: български (английски е наличен като опция)

    Метериали: в електронен формат, включени в цената

    Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

    цената включва 40 уч.ч. онлайн обучение (теория и практика).

    Сертификат: всички участници получават сертификат за завършен курс.

    Метод на плащане: PayPal, банков превод, наложен платеж

    Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.


    Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

    След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

    Ако имате въпроси можете да се свържете с нас, чрез меню контакти.


    Съдържание:

    Topic 105: Shells, Scripting and Data Management

    105.1 Customize and use the shell environment

    Description: Candidates should be able to customize shell environments to meet users’ needs. Candidates should be able to modify global and user profiles.

    Key Knowledge Areas:

    Set environment variables (e.g. PATH) at login or when spawning a new shell

    Write Bash functions for frequently used sequences of commands

    Maintain skeleton directories for new user accounts

    Set command search path with the proper directory

    The following is a partial list of the used files, terms and utilities: source, /etc/bash.bashrc, /etc/profile, env, export, set, unset, ~/.bash_profile, ~/.bash_login, ~/.profile, ~/.bashrc, ~/.bash_logout, function, alias, lists


    105.2 Customize or write simple scripts

    Description: Candidates should be able to customize existing scripts, or write simple new Bash scripts.

    Key Knowledge Areas:

    Use standard sh syntax (loops, tests)

    Use command substitution

    Test return values for success or failure or other information provided by a command

    Perform conditional mailing to the superuser

    Correctly select the script interpreter through the shebang (#!) line

    Manage the location, ownership, execution and suid-rights of scripts

    Terms and Utilities: for, while, test, if, read, seq, exec


    105.3 SQL data management

    Description: Candidates should be able to query databases and manipulate data using basic SQL commands. This objective includes performing queries involving joining of 2 tables and/or subselects.

    Key Knowledge Areas:

    Use of basic SQL commands

    Perform basic data manipulation

    Terms and Utilities: insert, update, select, delete, from, where, group by, order by, join


    Topic 106: User Interfaces and Desktops

    106.1 Install and configure X11

    Description: Candidates should be able to install and configure X11.

    Key Knowledge Areas:

    Verify that the video card and monitor are supported by an X server

    Awareness of the X font server

    Basic understanding and knowledge of the X Window configuration file

    Terms and Utilities: /etc/X11/xorg.conf, xhost, DISPLAY, xwininfo, xdpyinfo, X


    106.2 Setup a display manager

    Description: Candidates should be able to describe the basic features and configuration of the LightDM display manager. This objective covers awareness of the display managers XDM (X Display Manger), GDM (Gnome Display Manager) and KDM (KDE Display Manager).

    Key Knowledge Areas:

    Basic configuration of LightDM

    Turn the display manager on or off

    Change the display manager greeting

    Awareness of XDM, KDM and GDM

    Terms and Utilities: lightdm, /etc/lightdm/


    106.3 Accessibility

    Description: Demonstrate knowledge and awareness of accessibility technologies.

    Key Knowledge Areas:

    Basic knowledge of keyboard accessibility settings (AccessX)

    Basic knowledge of visual settings and themes

    Basic knowledge of assistive technology (ATs)

    Terms and Utilities: Sticky/Repeat Keys, Slow/Bounce/Toggle Keys, Mouse Keys, High Contrast/Large Print Desktop Themes, Screen Reader, Braille Display, Screen Magnifier, On-Screen Keyboard, Gestures (used at login, for example GDM), Orca, GOK, emacspeak


    Topic 107: Administrative Tasks

    107.1 Manage user and group accounts and related system files

    Description: Candidates should be able to add, remove, suspend and change user accounts.

    Key Knowledge Areas:

    Add, modify and remove users and groups

    Manage user/group info in password/group databases

    Create and manage special purpose and limited accounts

    Terms and Utilities: /etc/passwd, /etc/shadow, /etc/group, /etc/skel/, chage, getent, groupadd, groupdel, groupmod, passwd, useradd, userdel, usermod


    107.2 Automate system administration tasks by scheduling jobs

    Description: Candidates should be able to use cron or anacron to run jobs at regular intervals and to use at to run jobs at a specific time.

    Key Knowledge Areas:

    Manage cron and at jobs

    Configure user access to cron and at services

    Configure anacron

    Terms and Utilities: /etc/cron.{d,daily,hourly,monthly,weekly}/, /etc/at.deny, /etc/at.allow, /etc/crontab, /etc/cron.allow, /etc/cron.deny, /var/spool/cron/, crontab, at, atq, atrm, anacron, /etc/anacrontab


    107.3 Localisation and internationalisation

    Description: Candidates should be able to localize a system in a different language than English. As well, an understanding of why LANG=C is useful when scripting.

    Key Knowledge Areas:

    Configure locale settings and environment variables

    Configure timezone settings and environment variables

    Terms and Utilities: /etc/timezone, /etc/localtime

    /usr/share/zoneinfo/

    LC_*

    LC_ALL

    LANG

    TZ

    /usr/bin/locale

    tzselect

    timedatectl

    date

    iconv

    UTF-8

    ISO-8859

    ASCII

    Unicode

    Topic 108: Essential System Services


    108.1 Maintain system time


    Weight: 3


    Description: Candidates should be able to properly maintain the system time and synchronize the clock via NTP.


    Key Knowledge Areas:


    Set the system date and time

    Set the hardware clock to the correct time in UTC

    Configure the correct timezone

    Basic NTP configuration

    Knowledge of using the pool.ntp.org service

    Awareness of the ntpq command

    Terms and Utilities:


    /usr/share/zoneinfo/

    /etc/timezone

    /etc/localtime

    /etc/ntp.conf

    date

    hwclock

    ntpd

    ntpdate

    pool.ntp.org


    108.2 System logging


    Weight: 3


    Description: Candidates should be able to configure the syslog daemon. This objective also includes configuring the logging daemon to send log output to a central log server or accept log output as a central log server. Use of the systemd journal subsystem is covered. Also, awareness of rsyslog and syslog-ng as alternative logging systems is included.


    Key Knowledge Areas:


    Configuration of the syslog daemon

    Understanding of standard facilities, priorities and actions

    Configuration of logrotate

    Awareness of rsyslog and syslog-ng

    Terms and Utilities:


    syslog.conf

    syslogd

    klogd

    /var/log/

    logger

    logrotate

    /etc/logrotate.conf

    /etc/logrotate.d/

    journalctl

    /etc/systemd/journald.conf

    /var/log/journal/


    108.3 Mail Transfer Agent (MTA) basics


    Weight: 3


    Description: Candidates should be aware of the commonly available MTA programs and be able to perform basic forward and alias configuration on a client host. Other configuration files are not covered.


    Key Knowledge Areas:


    Create e-mail aliases

    Configure e-mail forwarding

    Knowledge of commonly available MTA programs (postfix, sendmail, qmail, exim) (no configuration)

    Terms and Utilities:


    ~/.forward

    sendmail emulation layer commands

    newaliases

    mail

    mailq

    postfix

    sendmail

    exim

    qmail

    ~/.forward

    sendmail emulation layer commands

    newaliases


    108.4 Manage printers and printing


    Weight: 2


    Description: Candidates should be able to manage print queues and user print jobs using CUPS and the LPD compatibility interface.


    Key Knowledge Areas:


    Basic CUPS configuration (for local and remote printers)

    Manage user print queues

    Troubleshoot general printing problems

    Add and remove jobs from configured printer queues

    Terms and Utilities:


    CUPS configuration files, tools and utilities

    /etc/cups/

    lpd legacy interface (lpr, lprm, lpq)

    Topic 109: Networking Fundamentals


    109.1 Fundamentals of internet protocols


    Weight: 4


    Description: Candidates should demonstrate a proper understanding of TCP/IP network fundamentals.


    Key Knowledge Areas:


    Demonstrate an understanding of network masks and CIDR notation

    Knowledge of the differences between private and public “dotted quad” IP addresses

    Knowledge about common TCP and UDP ports and services (20, 21, 22, 23, 25, 53, 80, 110, 123, 139, 143, 161, 162, 389, 443, 465, 514, 636, 993, 995)

    Knowledge about the differences and major features of UDP, TCP and ICMP

    Knowledge of the major differences between IPv4 and IPv6

    Knowledge of the basic features of IPv6

    Terms and Utilities:


    /etc/services

    IPv4, IPv6

    Subnetting

    TCP, UDP, ICMP


    109.2 Basic network configuration


    Weight: 4


    Description: Candidates should be able to view, change and verify configuration settings on client hosts.


    Key Knowledge Areas:


    Manually and automatically configure network interfaces

    Basic TCP/IP host configuration

    Setting a default route

    Terms and Utilities:


    /etc/hostname

    /etc/hosts

    /etc/nsswitch.conf

    ifconfig

    ifup

    ifdown

    ip

    route

    ping


    109.3 Basic network troubleshooting


    Weight: 4


    Description: Candidates should be able to troubleshoot networking issues on client hosts.


    Key Knowledge Areas:


    Manually and automatically configure network interfaces and routing tables to include adding, starting, stopping, restarting, deleting or reconfiguring network interfaces

    Change, view, or configure the routing table and correct an improperly set default route manually

    Debug problems associated with the network configuration

    Terms and Utilities:


    ifconfig

    ip

    ifup

    ifdown

    route

    host

    hostname

    dig

    netstat

    ping

    ping6

    traceroute

    traceroute6

    tracepath

    tracepath6

    netcat


    109.4 Configure client side DNS


    Weight: 2


    Description: Candidates should be able to configure DNS on a client host.


    Key Knowledge Areas:


    Query remote DNS servers

    Configure local name resolution and use remote DNS servers

    Modify the order in which name resolution is done

    Terms and Utilities:


    /etc/hosts

    /etc/resolv.conf

    /etc/nsswitch.conf

    host

    dig

    getent

    Topic 110: Security


    110.1 Perform security administration tasks


    Weight: 3


    Description: Candidates should know how to review system configuration to ensure host security in accordance with local security policies.


    Key Knowledge Areas:


    Audit a system to find files with the suid/sgid bit set

    Set or change user passwords and password aging information

    Being able to use nmap and netstat to discover open ports on a system

    Set up limits on user logins, processes and memory usage

    Determine which users have logged in to the system or are currently logged in

    Basic sudo configuration and usage

    Terms and Utilities:


    find

    passwd

    fuser

    lsof

    nmap

    chage

    netstat

    sudo

    /etc/sudoers

    su

    usermod

    ulimit

    who, w, last


    110.2 Setup host security


    Weight: 3


    Description: Candidates should know how to set up a basic level of host security.


    Key Knowledge Areas:


    Awareness of shadow passwords and how they work

    Turn off network services not in use

    Understand the role of TCP wrappers

    Terms and Utilities:


    /etc/nologin

    /etc/passwd

    /etc/shadow

    /etc/xinetd.d/

    /etc/xinetd.conf

    /etc/inetd.d/

    /etc/inetd.conf

    /etc/inittab

    /etc/init.d/

    /etc/hosts.allow

    /etc/hosts.deny


    110.3 Securing data with encryption


    Weight: 3


    Description: The candidate should be able to use public key techniques to secure data and communication.


    Key Knowledge Areas:


    Perform basic OpenSSH 2 client configuration and usage

    Understand the role of OpenSSH 2 server host keys

    Perform basic GnuPG configuration, usage and revocation

    Understand SSH port tunnels (including X11 tunnels)

    Terms and Utilities:


    ssh

    ssh-keygen

    ssh-agent

    ssh-add

    ~/.ssh/id_rsa and id_rsa.pub

    ~/.ssh/id_dsa and id_dsa.pub

    /etc/ssh/ssh_host_rsa_key and ssh_host_rsa_key.pub

    /etc/ssh/ssh_host_dsa_key and ssh_host_dsa_key.pub

    ~/.ssh/authorized_keys

    ssh_known_hosts

    gpg

    ~/.gnupg/


    Онлайн Официален Курс:  Linux Professional Institute LPIC-1 101 System Administrator


    Формат на курса: Онлайн, провежда се в реално време от сертифициран инструктор във виртуална класна стая. Курсът е част от сертификационната програма на Linux Professional Institute и служи за подготовка за сертифициране за ниво LPIC-1, както и за професионално развитие като Linux System Administrator и Linux IT специалист.

    Език на курса: български (английски е наличен като опция).

    Метериали: в електронен формат, включени в цената.

    Пакет от услуги включени към курса:

    • онлайн обучение
    • сертификат за завършен курс
    • достъп до виртуален лаб
    • книги и учебни материали
    • достъп до онлайн тестове
    • видео библиотека към курса - достъп до видео записи на сесиите към курса

    Курсът е подходящ за: junior Linux администратори; желаещи да се сертифицират за LPIC-1; желаещи да научат Linux и да повишат професионалната си квалификация.

    Интерактивен формат: участниците имат възможност да участват в дискусии, да задават въпроси, двупосочна връзка с интруктора в реално време, чрез виртуалната класна стая. Онлайн формата се провежда в реално време по график, участниците са свързани наживо, за разлика от видео курсовете при онлайн формата не се презентира видео запис.

    График: изберете удобен за вас график от падащото меню.  Курсът се провежда в удобно и съобразено с участниците време.

    Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

    Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

    Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

    Сертификат: всички участници получават сертификат за завършен курс.

    Метод на плащане: PayPal, банков превод, наложен платеж, брой.

    Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.


    Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

    След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

    Ако имате въпроси можете да се свържете с нас, чрез меню контакти.


    Съдържание:

    Topic 101: System Architecture

    101.1 Determine and configure hardware settings

    Key Knowledge Areas:

    • Tools and utilities to list various hardware information (e.g. lsusb, lspci, etc.)
    • Tools and utilities to manipulate USB devices
    • Conceptual understanding of sysfs, udev, dbus
    • The following is a partial list of the used files, terms and utilities:

    /sys/

    /proc/

    /dev/

    modprobe

    lsmod

    lspci

    lsusb


    101.2 Boot the system

    Key Knowledge Areas:

    • Provide common commands to the boot loader and options to the kernel at boot time
    • Demonstrate knowledge of the boot sequence from BIOS to boot completion
    • Understanding of SysVinit and systemd
    • Awareness of Upstart
    • Check boot events in the log files
    • Terms and Utilities:

    dmesg

    BIOS

    bootloader

    kernel

    initramfs

    init

    SysVinit

    systemd


    101.3 Change runlevels / boot targets and shutdown or reboot system

    Key Knowledge Areas:

    • Set the default runlevel or boot target
    • Change between runlevels / boot targets including single user mode
    • Shutdown and reboot from the command line
    • Alert users before switching runlevels / boot targets or other major system events
    • Properly terminate processes
    • Terms and Utilities:

    /etc/inittab

    shutdown

    init

    /etc/init.d/

    telinit

    systemd

    systemctl

    /etc/systemd/

    /usr/lib/systemd/

    wall


    Topic 102: Linux Installation and Package Management


    102.1 Design hard disk layout

    Key Knowledge Areas:

    • Allocate filesystems and swap space to separate partitions or disks
    • Tailor the design to the intended use of the system
    • Ensure the /boot partition conforms to the hardware architecture requirements for booting
    • Knowledge of basic features of LVM
    • Terms and Utilities:

    / (root) filesystem

    /var filesystem

    /home filesystem

    /boot filesystem

    swap space

    mount points

    partitions


    102.2 Install a boot manager

    Key Knowledge Areas:

    • Providing alternative boot locations and backup boot options
    • Install and configure a boot loader such as GRUB Legacy
    • Perform basic configuration changes for GRUB 2
    • Interact with the boot loader
    • The following is a partial list of the used files, terms and utilities:


    menu.lst, grub.cfg and grub.conf

    grub-install

    grub-mkconfig

    MBR


    102.3 Manage shared libraries

    • Key Knowledge Areas:
    • Identify shared libraries
    • Identify the typical locations of system libraries
    • Load shared libraries
    • Terms and Utilities:

    ldd

    ldconfig

    /etc/ld.so.conf

    LD_LIBRARY_PATH


    102.4 Use Debian package management

    Key Knowledge Areas:

    • Install, upgrade and uninstall Debian binary packages
    • Find packages containing specific files or libraries which may or may not be installed
    • Obtain package information like version, content, dependencies, package integrity and installation status (whether or not the package is installed)
    • Terms and Utilities:

    /etc/apt/sources.list

    dpkg

    dpkg-reconfigure

    apt-get

    apt-cache

    aptitude


    102.5 Use RPM and YUM package management

    Key Knowledge Areas:



    • Install, re-install, upgrade and remove packages using RPM and YUM
    • Obtain information on RPM packages such as version, status, dependencies, integrity and signatures
    • Determine what files a package provides, as well as find which package a specific file comes from
    • Terms and Utilities:


    rpm

    rpm2cpio

    /etc/yum.conf

    /etc/yum.repos.d/

    yum

    yumdownloader


    Topic 103: GNU and Unix Commands


    103.1 Work on the command line

    • Key Knowledge Areas:
    • Use single shell commands and one line command sequences to perform basic tasks on the command line
    • Use and modify the shell environment including defining, referencing and exporting environment variables
    • Use and edit command history
    • Invoke commands inside and outside the defined path
    • Terms and Utilities:

    bash

    echo

    env

    export

    pwd

    set

    unset

    man

    uname

    history

    .bash_history


    103.2 Process text streams using filters

    Key Knowledge Areas:

    • Send text files and output streams through text utility filters to modify the output using standard UNIX commands found in the GNU textutils package
    • Terms and Utilities:

    cat cut expandfmt head join less nl od paste pr sed sort split tail tr unexpand uniq wc


    103.3 Perform basic file management

    Key Knowledge Areas:

    • Copy, move and remove files and directories individually
    • Copy multiple files and directories recursively
    • Remove files and directories recursively
    • Use simple and advanced wildcard specifications in commands
    • Using find to locate and act on files based on type, size, or time
    • Usage of tar, cpio and dd
    • Terms and Utilities:

    cp

    find

    mkdir

    mv

    ls

    rm

    rmdir

    touch

    tar

    cpio

    dd

    file

    gzip

    gunzip

    bzip2

    xz

    file globbing


    103.4 Use streams, pipes and redirects

    Key Knowledge Areas:

    • Redirecting standard input, standard output and standard error
    • Pipe the output of one command to the input of another command
    • Use the output of one command as arguments to another command
    • Send output to both stdout and a file
    • Terms and Utilities:


    tee

    xargs


    103.5 Create, monitor and kill processes

    Key Knowledge Areas:

    • Run jobs in the foreground and background
    • Signal a program to continue running after logout
    • Monitor active processes
    • Select and sort processes for display
    • Send signals to processes
    • Terms and Utilities:

    &

    bg

    fg

    jobs

    kill

    nohup

    ps

    top

    free

    uptime

    pgrep

    pkill

    killall

    screen


    103.6 Modify process execution priorities

    Key Knowledge Areas:

    • Know the default priority of a job that is created
    • Run a program with higher or lower priority than the default
    • Change the priority of a running process
    • Terms and Utilities:


    nice

    ps

    renice

    top


    103.7 Search text files using regular expressions

    Key Knowledge Areas:

    • Create simple regular expressions containing several notational elements
    • Use regular expression tools to perform searches through a filesystem or file content
    • Terms and Utilities:

    grep

    egrep

    fgrep

    sed

    regex(7)


    103.8 Perform basic file editing operations using vi

    Key Knowledge Areas:

    • Navigate a document using vi
    • Use basic vi modes
    • Insert, edit, delete, copy and find text
    • Terms and Utilities:

    vi

    /, ?

    h,j,k,l

    i, o, a

    c, d, p, y, dd, yy

    ZZ, :w!, :q!, :e!


    Topic 104: Devices, Linux Filesystems, Filesystem Hierarchy Standard


    104.1 Create partitions and filesystems

    Key Knowledge Areas:

    • Manage MBR partition tables
    • Use various mkfs commands to create various filesystems such as:
    • ext2/ext3/ext4
    • XFS
    • VFAT
    • Awareness of ReiserFS and Btrfs
    • Basic knowledge of gdisk and parted with GPT
    • Terms and Utilities:


    fdisk

    gdisk

    parted

    mkfs

    mkswap


    104.2 Maintain the integrity of filesystems

    Key Knowledge Areas:

    • Verify the integrity of filesystems
    • Monitor free space and inodes
    • Repair simple filesystem problems
    • Terms and Utilities:


    du

    df

    fsck

    e2fsck

    mke2fs

    debugfs

    dumpe2fs

    tune2fs

    XFS tools (such as xfs_metadump and xfs_info)


    104.3 Control mounting and unmounting of filesystems

    Key Knowledge Areas:

    • Manually mount and unmount filesystems
    • Configure filesystem mounting on bootup
    • Configure user mountable removable filesystems
    • Terms and Utilities:


    /etc/fstab

    /media/

    mount

    umount


    104.4 Manage disk quotas

    Key Knowledge Areas:

    • Set up a disk quota for a filesystem
    • Edit, check and generate user quota reports
    • Terms and Utilities:


    quota

    edquota

    repquota

    quotaon


    104.5 Manage file permissions and ownership

    Key Knowledge Areas:

    • Manage access permissions on regular and special files as well as directories
    • Use access modes such as suid, sgid and the sticky bit to maintain security
    • Know how to change the file creation mask
    • Use the group field to grant file access to group members
    • Terms and Utilities:


    chmod

    umask

    chown

    chgrp


    104.6 Create and change hard and symbolic links

    Key Knowledge Areas:

    • Create links
    • Identify hard and/or soft links
    • Copying versus linking files
    • Use links to support system administration tasks
    • Terms and Utilities:


    ln

    ls


    104.7 Find system files and place files in the correct location

    Key Knowledge Areas:

    Understand the correct locations of files under the FHS

    Find files and commands on a Linux system

    Know the location and purpose of important file and directories as defined in the FHS

    Terms and Utilities:


    find

    locate

    updatedb

    whereis

    which

    type

    /etc/updatedb.conf



    Формат на курса: Онлайн, воден от инструктор, виртуална класна стая

    Език на курса: български (английски е наличен като опция).

    Метериали: в електронен формат, включени в цената.

    Пакет от услуги включени към курса:

    онлайн обучение

    сертификат за завършен курс

    достъп до виртуален лаб

    книги и учебни материали

    достъп до онлайн тестове

    видео библиотека към курса - достъп до видео записи на сесиите към курса

    Курсът е подходящ за: начинаещи в облачните технологии; желаещи да се сертифицират; желаещи да повишат професионалната си квалификация.

    График: изберете удобен за вас график от падащото меню.  Курса се провежда в удобно и съобразено с участниците време.

    Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

    Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

    Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

    Сертификат: всички участници получават сертификат за завършен курс.

    При отказ от достъп до лаб среда се предоставя отстъпка.


    При отказ от достъп до лаб среда се предоставя отстъпка.

    Допълнителна информация за съдържанието на курса можете на откриете на нашият сайт - http://www.it-training.pro

    Метод на плащане: PayPal, банков превод, наложен платеж, брой.


    Заявка за издаване на фактура се приема към момента на записването на съответния курс.

    Фактура се издава в рамките на 7 дни от потвърждаване на плащането.

    За повече информация използвайте формата за контакт.


    Дати на провеждане: моля използвайте календара в основният ни сайт.

    Ще се свържем с Вас за потвърждаване на датите.


    The AWS Certified Solutions Architect – Associate exam is intended for individuals with experience designing distributed applications and systems on the AWS platform. Exam concepts you should understand for this exam include:


    Designing and deploying scalable, highly available, and fault tolerant systems on AWS

    Lift and shift of an existing on-premises application to AWS

    Ingress and egress of data to and from AWS

    Selecting the appropriate AWS service based on data, compute, database, or security requirements

    Identifying appropriate use of AWS architectural best practices

    Estimating AWS costs and identifying cost control mechanisms

    Candidate Overview

    Eligible candidates for this exam have:

    One or more years of hands-on experience designing available, cost efficient, fault tolerant, and scalable distributed systems on AWS

    In-depth knowledge of at least one high-level programming language

    Ability to identify and define requirements for an AWS-based application

    Experience with deploying hybrid systems with on-premises and AWS components

    Capability to provide best practices for building secure and reliable applications on the AWS platform


    Introduction

    The AWS Certified Solutions Architect – Associate exam is intended for individuals who perform a Solutions

    Architect role. This exam validates an examinee’s ability to:

    • Identify and gather requirements in order to define a solution to be built using architecture best practices.

    • Provide guidance on architectural best practices to developers and system administrators throughout the

    lifecycle of the project.

    The knowledge and skills required at this level should include all of the following areas and objective components.

    The knowledge level can be defined as including the majority of the following skills or qualities:

    AWS Knowledge

    • Hands-on experience using compute, networking, storage, and database AWS services

    • Professional experience architecting large-scale distributed systems

    • Understanding of elasticity and scalability concepts

    • Understanding of the AWS global infrastructure

    • Understanding of network technologies as they relate to AWS

    • A good understanding of all security features and tools that AWS provides and how they relate to

    traditional services

    • A strong understanding of client interfaces to the AWS platform

    • Hands-on experience with AWS deployment and management services

    General IT Knowledge

    • Excellent understanding of typical multi-tier architectures: web servers, caching, application servers, load

    balancers, and storage

    • Understanding of Relational Database Management System (RDBMS) and NoSQL

    • Knowledge of message queuing and Enterprise Service Bus (ESB)

    • Familiarity with loose coupling and stateless systems

    • Understanding of different consistency models in distributed systems

    • Knowledge of Content Delivery Networks (CDN)

    • Hands-on experience with core LAN/WAN network technologies

    • Experience with route tables, access control lists, firewalls, NAT, HTTP, DNS, IP and OSI Network

    • Knowledge of RESTful Web Services, XML, JSON

    • Familiarity with the software development lifecycle

    • Work experience with information and application security concepts, mechanisms, and tools

    • Awareness of end-user computing and collaborative technologies

    These training courses or other equivalent methodologies will assist in exam preparation:

    • Architecting on AWS (aws.amazon.com/training/architect)

    • In-depth knowledge or training in at least one high-level programming language

    • AWS Cloud Computing Whitepapers (aws.amazon.com/whitepapers)

    o Overview of Amazon Web Services

    o Overview of Security Processes

    o AWS Risk & Compliance Whitepaper

    o Storage Options in the Cloud

    o Architecting for the AWS Cloud: Best Practices

    • Experience deploying hybrid systems with on-premises and AWS components

    • Use of the AWS Architecture Center website (aws.amazon.com/architecture)

    Note This examination blueprint includes weighting, test objectives, and example content. Example topics and

    concepts are included to clarify the test objectives; they should not be construed as a comprehensive listing of all

    of the content of this examination. 

    AWS Certified Solutions Architect

    Associate Level Exam Blueprint

    2

    The table below lists the domains measured by this examination and the extent to which they are represented.

    Domain % of Examination

    1.0 Designing highly available, cost-efficient, fault-tolerant, scalable systems 60%

    2.0 Implementation/Deployment 10%

    3.0 Data Security 20%

    4.0 Troubleshooting 10%

    TOTAL 100%

    Response Limits

    The examinee selects—from four or more response options—the one or multiple options that best complete the

    statement or answer the question. Distracters, or wrong answers, are response options that examinees with

    incomplete knowledge or skill would probably choose, and are generally plausible responses that fit into the

    content area defined by the test objective.

    Test item formats used in this examination are:

    • Multiple-choice: Examinee selects one option that best answers the question or completes a statement.

    The option can be embedded in a graphic where the examinee “points and clicks” on their selection

    choice to complete the test item.

    • Multiple-response: Examinee selects more than one option that best answers the question or completes

    a statement.

    • Sample Directions: Examinee reads the statement or question and, from the response options, selects

    only the options that represent the most correct or best answers given the information.

    Content Limits

    1 Domain 1.0: Designing highly available, cost-efficient, fault-tolerant, scalable systems

    1.1 Identify and recognize cloud architecture considerations, such as fundamental components and effective

    designs.

    Content may include the following:

    • How to design cloud services

    • Planning and design

    • Monitoring and logging

    • Familiarity with:

    o Best practices for AWS architecture

    o Developing to client specifications, including pricing/cost (e.g., on Demand vs. Reserved vs.

    Spot; RTO and RPO DR Design)

    o Architectural trade-off decisions (e.g., high availability vs. cost, Amazon Relational Database

    Service (RDS) vs. installing your own database on Amazon Elastic Compute Cloud (EC2))

    o Hybrid IT architectures (e.g., Direct Connect, Storage Gateway, VPC, Directory Services)

    o Elasticity and scalability (e.g., Auto Scaling, SQS, ELB, CloudFront)

    2 Domain 2.0: Implementation/Deployment

    2.1 Identify the appropriate techniques and methods using Amazon EC2, Amazon S3, AWS Elastic

    Beanstalk, AWS CloudFormation, AWS OpsWorks, Amazon Virtual Private Cloud (VPC), and AWS

    Identity and Access Management (IAM) to code and implement a cloud solution.

    Content may include the following:

    • Configure an Amazon Machine Image (AMI)

    • Operate and extend service management in a hybrid IT architecture

    • Configure services to support compliance requirements in the cloud

    • Launch instances across the AWS global infrastructure

    • Configure IAM policies and best practices

    AWS Certified Solutions Architect

    Associate Exam Blueprint

    3

    3 Domain 3.0: Data Security

    3.1 Recognize and implement secure practices for optimum cloud deployment and maintenance.

    Content may include the following:

    • AWS shared responsibility model

    • AWS platform compliance

    • AWS security attributes (customer workloads down to physical layer)

    • AWS administration and security services

    • AWS Identity and Access Management (IAM)

    • Amazon Virtual Private Cloud (VPC)

    • AWS CloudTrail

    • Ingress vs. egress filtering, and which AWS services and features fit

    • “Core” Amazon EC2 and S3 security feature sets

    • Incorporating common conventional security products (Firewall, VPN)

    • Design patterns

    • DoS mitigation

    • Encryption solutions (e.g., key services)

    • Complex access controls (building sophisticated security groups, ACLs, etc.)

    • Amazon CloudWatch for the security architect

    • Trusted Advisor

    • CloudWatch Logs

    3.2 Recognize critical disaster recovery techniques and their implementation.

    Content may include the following:

    • Disaster recovery

    o Recovery time objective

    o Recovery point objective

    o Amazon Elastic Block Store

    • AWS Import/Export

    • AWS Storage Gateway

    • Amazon Route53

    • Validation of data recovery method

    4 Domain 4.0: Troubleshooting

    Content may include the following:

    • General troubleshooting information and questions


    Формат на курса: Онлайн, провежда се в реално време от инструктор във виртуална класна стая.

    Език на курса: български (английски е наличен като опция).

    Метериали: в електронен формат, включени в цената.

    Пакет от услуги включени към курса:

    онлайн обучение

    сертификат за завършен курс

    достъп до виртуален лаб

    книги и учебни материали

    достъп до онлайн тестове

    видео библиотека към курса - достъп до видео записи на сесиите към курса

    Курсът е подходящ за: начинаещи Juniper или мрежови администратори; желаещи да се сертифицират за Juniper Networks JNCIA; желаещи да научат Juniper JUNOS и да повишат професионалната си квалификация.

    Интерактивен формат: участниците имат възможност да участват в дискусии, да задават въпроси, двупосочна връзка с интруктора в реално време, чрез виртуалната класна стая. Онлайн формата се провежда в реално време по график, участниците са свързани наживо, за разлика от видео курсовете при онлайн формата не се презентира видео запис.

    График: изберете удобен за вас график от падащото меню.  Курса се провежда в удобно и съобразено с участниците време.

    Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

    Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

    Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

    Сертификат: всички участници получават сертификат за завършен курс.

    При отказ от достъп до лаб среда се предоставя отстъпка.

    Допълнителна информация за съдържанието на курса можете на откриете на нашият сайт - http://www.it-training.bg

    Метод на плащане: PayPal, банков превод, наложен платеж, брой.


    Заявка за издаване на фактура се приема към момента на записването на съответния курс.

    Фактура се издава в рамките на 7 дни от потвърждаване на плащането.

    За повече информация използвайте формата за контакт.


    Дати на провеждане: моля използвайте календара в основният ни сайт.

    Ще се свържем с Вас за потвърждаване на датите.


    The Juniper Networks Certified Associate - JunOS (JNCIA-Junos) е задължително входно ниво, което се изисква за да се достигнат по - високите нива в сертифицирането на Juniper. Успешните кандидати демонстрират познаване на Junos OS на Juniper Networks, основни познания за мрежи, и основни познания за мрежовата маршрутизация и комутация.


    Проектиран за мрежови специалисти с начинаещ-междинен познания за работа в мрежа, този писмен изпит проверява разбирането на кандидата върху мрежовите основи, както и основната функционалност на Junos OS на Juniper Networks.


    Сертифицирането на JNCIA-Junos е валидно за срок от три години. Ресертификация се постига чрез  повторно преминаване на JN0-102 изпита или успешното взимане на по - горен изпит.


    Подробни изпит Цели включват:


    Networking Fundamentals

    JunOS OS Fundamentals

    потребителски интерфейси

    Основи на JunOS конфигурация

    Оперативен мониторинг и поддръжка

    основи на маршрутизиране

    Routing Политика и защитната стена - Филтри


    Networking Fundamentals

    Junos OS Fundamentals

    User Interfaces

    Junos Configuration Basics

    Operational Monitoring and Maintenance

    Routing Fundamentals

    Routing Policy and Firewall Filters


    Online Training Linux Foundation Certified System Administrator - LFCS



    Резултат с изображение за 100% guarantee

    Course Format: online instructor lead training in a virtual class room

    Language: Bulgarian (English optional)

    Course Files: digital format, price included in the course

    Lab environment: individual lab env. for each student.

    Course Duration40 learning hours online training (theory and practice).


    If lab access is not required by student, the price will be deduct. 

    Additional Information about the training content can be found on our web site - http://www.it-training.pro The ONline Training Academy

    Payment Method: PayPal, bank transfer, cash payments, wire transfer


    Invoice can be requested with a support request using our contacts page.

    The Invoice is issued normally in 7 days after the payment has been confirmed. 

    Additional information can be found using our contacts page.


    Training Dates: please check the IT Training Calendar in the main site. 

    We will contact you to confirm the dates and registration. 



    Linux is the #1 operating system for web servers, cloud computing, smart phones and consumer electronics. Because Linux is growing so quickly, there is a shortage of experienced Linux professionals. According to the 2015 Linux Jobs Report, 97% of hiring managers are looking to add Linux talent this year. There are 50,000+ open job listings requiring Linux on dice.com. And individuals with Linux skills are being recruited at an unprecedented rate. Demonstrate to employers that you have both the skills and the knowledge to be a top sysadmin with the Linux Foundation Certified System Administrator.

    LFS101

    Introduction to Linux

    1. The Linux Foundation
    2. Linux Philosophy and Concepts
    3. Linux Structure and Installation
    4. Graphical Interface
    5. System Configuration From The Graphical Interface
    6. Finding Linux Documentation
    7. Command Line Operators
    8. File Operations
    9. User Environment
    10. Text Editors
    11. Local Security Principles
    12. Network Operations
    13. Manipulating Text
    14. Printing
    15. Bash Shell Scripting
    16. Advanced Bash Scripting
    17. Processes
    18. Common Applications

    Essentials of System Administration (LFS201)

    Essentials of System Administration

    1. Preface
      • Introduction
      • Relationship to LFS101x
      • Using as LFCS Exam Preparation
      • Course Formatting
      • Read the Documentation
      • Target Platform
      • Command Line vs Graphical Interface
      • Target Linux Distributions
      • Installation: What to Use for this Course
      • Course Timing
      • Lab Exercises
      • Change, Repetition, and Holy Wars
      • The Linux Foundation
      • Linux Foundation Training
      • Labs
    2. System Startup and Shutdown
      • Understanding the Boot Sequence
      • BIOS
      • Boot Loaders
      • Configuration Files in /etc
      • /etc/sysconfig
      • /etc/default
      • Shutting Down and Rebooting
      • Labs
    3. GRUB
      • What is GRUB?
      • Interactive Selections with GRUB at Boot
      • Installing GRUB
      • GRUB Device Nomenclature
      • Customizing the GRUB Configuration File
      • Labs
    4. init: SystemV, Upstart, systemd
      • The init Process
      • Startup Alternatives
      • SysVinit Runlevels
      • SysVinit and /etc/inittab
      • SysVinit Startup Scripts
      • chkconfig
      • service
      • chkconfig and service on Debian-based Systems
      • Upstart
      • Upstart Utilities
      • systemd
      • systemd Configuration Files
      • Systemctl
      • Labs
    5. Linux Filesystem Tree Layout
      • One Big Filesystem
      • Data Distinctions
      • FHS Linux Standard Directory Tree
      • Main Directory Layout
      • The root (/) Directory and Filesystem
      • /bin
      • /boot
      • Other Files and Directories in /boot
      • /dev
      • /etc
      • /home
      • /lib
      • /media
      • /mnt
      • /opt
      • /proc
      • /sys
      • /root
      • /sbin
      • /tmp
      • /usr
      • /var
      • /run
      • Labs
    6. Kernel Services and Configuration
      • Kernel Overview
      • Main Kernel Tasks
      • Kernel Command Line
      • Kernel Boot Parameters
      • sysctl
      • Labs
    7. Kernel Modules
      • Advantages of Kernel Modules
      • Module Utilities
      • Module Loading and Unloading
      • modprobe
      • Some Considerations with Modules
      • modinfo
      • Module Parameters
      • Kernel Module Configuration
      • Labs
    8. Devices and udev
      • Device Nodes
      • Major and Minor Numbers
      • udev
      • udev Components
      • udev and Hotplug
      • The udev Device Manager
      • udev Rule Files
      • Creating udev Rules
      • Some Examples of Rules Files
      • Labs
    9. Partitioning and Formatting Disks
      • Common Disk Types
      • Disk Geometry
      • Partitioning
      • Why partition?
      • Partition Table
      • Naming Disk Devices and Nodes
      • More on SCSI Device Names
      • blkid and lsblk
      • Sizing up partitions
      • Backing up and Restoring Partition Tables
      • Partition table editors
      • Using fdisk
      • Labs
    10. Encrypting Disks
      • Why Use Encryption?
      • LUKS
      • cryptsetup
      • Using an Encrypted Partition
      • Mounting at Boot
      • Labs
    11. Linux Filesystems and the VFS
      • Filesystem Basics
      • Filesystem Tree Organization
      • Virtual File System (VFS)
      • Available Filesystems
      • Journalling Filesystems
      • Current Filesystem Types
      • Special Filesystems
      • Labs
    12. Filesystem Features: Attributes, Creating, Checking, Mounting
      • Inodes
      • Directory Files
      • Extended Attributes and lsattr/chattr
      • Creating and Formatting Filesystems
      • Checking and Fixing Filesystems
      • Mounting and Unmounting Filesystems
      • mount
      • mount Options
      • umount
      • Mounting Filesystems at Boot
      • Listing Currently Mounted Filesystems
      • Labs
    13. Filesystem Features: Swap, Quotas, Usage
      • Swap
      • Quotas
      • Setting up Quotas
      • quotacheck
      • Turning quotas on and off
      • Examining Quotas
      • Setting quotas
      • Filesystem Usage
      • Disk Space Usage
      • Labs
    14. The Ext2/Ext3/Ext4 Filesystems
      • Ext4 History and Basics
      • Ext4 Features
      • Ext4 Layout
      • Block Groups
      • dumpe2fs
      • tune2fs
      • Superblock Information
      • Data Blocks and Inodes
      • Ext4 Filesystem Enhancements
      • Labs
    15. The XFS and btrfs Filesystems
      • XFS Features
      • XFS Filesystem Maintenance
      • The btrfs Filesystem
      • Labs
    16. Logical Volume Management (LVM)
      • LVM
      • LVM and RAID
      • Volumes and Volume Groups
      • Logical Volumes Utilities
      • Creating Logical Volumes
      • Displaying Logical Volumes
      • Resizing Logical Volumes
      • Examples of Resizing
      • LVM Snapshots
      • Labs
    17. RAID
      • RAID
      • RAID Levels
      • Software RAID Configuration
      • Monitoring RAIDs
      • RAID Hot Spares
      • Labs
    18. Local System Security
      • Local System Security
      • Creating a Security Policy
      • What to Include in the Policy
      • What Risks to Assess
      • Choosing a Security Philosophy
      • Some General Security Guidelines
      • Updates and Security
      • Hardware Accessibility and Vulnerability
      • Hardware Access Guidelines
      • Protection of BIOS
      • Protecting the Boot Loader with Passwords
      • Filesystem Security: mount Options
      • setuid and setgid
      • Setting the setuid/setgid Bits
      • Labs
    19. Linux Security Modules
      • What are Linux Security Modules?
      • LSM Choices
      • SELinux Overview
      • SELinux Modes
      • SELinux Policies
      • Context Utilities
      • SELinux and Standard Command Line Tools
      • SELinux Context Inheritance and Preservation
      • restorecon
      • semanage fcontext
      • Using SELinux Booleans
      • getsebool and setsebool
      • Troubleshooting Tools
      • Additional Online Resources
      • AppArmor
      • Labs
    20. Processes
      • Processes, Programs and Threads
      • The init Process
      • Processes
      • Process Attributes
      • Controlling Processes with ulimit
      • Process Permissions and setuid
      • Process States
      • Execution Modes
      • User Mode
      • System Mode
      • Daemons
      • Kernel-Created Processes
      • Process Creating and Forking
      • Creating Processes in a Command Shell
      • Using nice to Set Priorities
      • Modifying the Nice Value
      • Labs
    21. Signals
      • What are Signals?
      • Types of Signals
      • kill
      • killall and pkill
      • Labs
    22. System Monitoring
      • Available Monitoring Tools
      • The /proc and /sys Pseudo-filesystems
      • /proc Basics
      • A Survey of /proc
      • /proc/sys
      • /sys Basics
      • A Survey of /sys
      • sar
      • Labs
    23. Process Monitoring
      • Monitoring Tools
      • Viewing Process States with ps
      • BSD Option Format for ps
      • ps Output Fields
      • UNIX Option Format for ps
      • Customizing the ps Output
      • Using pstree
      • Viewing System Loads with top
      • top Options
      • Labs
    24. I/O Monitoring and Tuning
      • Disk Bottlenecks
      • iostat
      • iostat Options
      • iostat Extended Options
      • iotop
      • Using ionice to Set I/O Priorities
      • Labs
    25. I/O Scheduling
      • I/O Scheduling
      • I/O Scheduler Choices
      • I/O Scheduling and SSD Devices
      • Tunables and Switching The I/O Scheduler at Run Time
      • CFQ (Completely Fair Queue Scheduler)
      • CFQ Tunables
      • Deadline Scheduler
      • Deadline Tunables
      • Labs
    26. Memory: Monitoring Usage and Tuning
      • Memory Tuning Considerations
      • Memory Monitoring Tools
      • /proc/sys/vm
      • vmstat
      • /proc/meminfo
      • OOM Killer
      • Labs
    27. Package Management Systems
      • Software Packaging Concepts
      • Why Use Packages?
      • Packages Types
      • Available Package Management Systems
      • Packaging Tool Levels and Varieties
      • Package Sources
      • Creating Software Packages
      • Labs
    28. RPM
      • RPM
      • Advantages of Using RPM
      • Package File Names
      • Database Directory
      • Helper Programs and Modifying Settings
      • Queries
      • Verifying Packages
      • Installing Packages
      • Uninstalling Packages
      • Upgrading Packages
      • Freshening Packages
      • Upgrading the Kernel
      • Using rpm2cpio
      • Labs
    29. DPKG
      • DPKG Essentials
      • Package File Names
      • Source Packages
      • DPKG Queries
      • Installing/Upgrading/Uninstalling Packages
      • Labs
    30. yum
      • Package Installers
      • What Is yum?
      • Configuring yum to Use Repositories
      • Repository Files
      • Queries
      • Verifying Packages
      • Installing/Removing/Upgrading Packages
      • Additional Commands
      • Labs
    31. zypper
      • What Is zypper?
      • zypper Queries
      • Installing/Removing/Upgrading
      • Additional zypper Commands
      • Labs
    32. APT
      • What Is APT?
      • apt-get
      • Queries Using apt-cache
      • Installing/Removing/Upgrading
      • Labs
    33. User Account Management
      • User Accounts
      • Attributes of a User Account
      • Creating User Accounts with useradd
      • Modifying and Deleting User Accounts
      • Locked Accounts
      • User IDs and /etc/passwd
      • /etc/shadow
      • Why Use /etc/shadow?
      • Password Management
      • chage: Password Aging
      • Restricted shell
      • Restricted Accounts
      • The root Account
      • SSH
      • ssh Configuration Files
      • Labs
    34. Group Management
      • Groups
      • Group Management
      • User Private Groups
      • Group Membership
      • Labs
    35. File Permissions and Ownership
      • Owner, Group and World
      • File Access Rights
      • File Permissions and Security and Authentication
      • Changing permissions: chmod
      • chmod: Numerical Syntax for Permissions
      • Changing User and Group File Ownership: chown and chgrp
      • umask
      • Filesystem ACLs
      • Getting and Setting ACLs
      • Labs
    36. Pluggable Authentication Modules (PAM)
      • PAM: A Unified Approach to Authentication
      • Authentication Process
      • PAM Configuration Files
      • PAM Rules
      • LDAP Authentication
      • Labs
    37. Backup and Recovery Methods
      • Why Backups?
      • What Needs Backup?
      • Tape Drives
      • Backup Methods
      • Backup Strategies
      • Backup Utilities
      • cpio
      • Using tar for Backups
      • Using tar for Restoring Files
      • Incremental Backups with tar
      • Compression: gzip, bzip2 and xz and Backups
      • dd
      • dd Examples
      • rsync
      • dump and restore
      • dump Options
      • Level 0 backup with dump
      • restore
      • mt
      • Backup Programs
      • Labs
    38. Network Addresses
      • IP Addresses
      • IPv4 Address Types
      • Special Addresses
      • IPv6 Address Types
      • IPv4 Address Classes
      • Netmasks
      • Hostname
      • Getting and Setting the Hostname
      • Labs
    39. Network Devices and Configuration
      • Network Devices
      • Problems with Network Device Names
      • Predictable Network Interface Device Names
      • Examples of the New Naming Scheme
      • NIC Configuration Files
      • ifconfig
      • The ip Utility
      • Examples of Using ip
      • Routing
      • Default Route
      • Static Routes
      • Name Resolution
      • /etc/hosts
      • DNS
      • Network Diagnostic Utilities
      • Labs
    40. Firewalls
      • What is a Firewall
      • Firewall Interfaces and Tools
      • firewalld
      • firewalld Service Status
      • Zones
      • Zone Management
      • Source Management
      • Service and Port Management
      • Labs
    41. Basic Troubleshooting
      • Troubleshooting Overview
      • Basic Techniques
      • Intuition and Experience
      • Things to Check: Networking
      • Things to Check: File Integrity
      • Boot Process Failures
      • Filesystem Corruption and Recovery
      • Using Rescue/Recovery Media
      • Common Utilities on Rescue/Recovery Disks
      • Using Rescue/Recovery Media
      • Labs
    42. System Rescue
      • Emergency Boot Media
      • Using Rescue Media
      • Rescue USB Key
      • Emergency Mode
      • Single User Mode
      • Labs

    http://www.it-training.pro/2016/12/25/70-334-core-solutions-of-microsoft-skype-for-business-2015/


    Module 1: Design and Architecture of Skype for Business Server 2015
    This module describes the high-level components and features of Skype for Business 2015. It also describes how to work with Skype for Business administrative tools, the main components of Skype for Business Online, and coexistence with on-premises Skype for Business Server 2015 servers.
    Lessons
    Overview of Skype for Business Components and Features
    Introduction to the Skype for Business Administrative Tools
    Lab : Designing and Publishing a Skype for Business Server Topology
    Designing and Creating the Topology
    Updating the Topology for the New York Site
    After completing this module, students will be able to:
    Describe the high-level components and features of Skype for Business 2015.
    Work with Skype for Business administrative tools.
    Module 2: Installing and Implementing Skype for Business Server 2015
    This module explains the external dependencies for Skype for Business Server. It describes the Session Initiation Protocol (SIP) domain requirements to ensure a successful implementation. This module also explains how to install Skype for Business Server, and it describes how Skype for Business Server integrates with Exchange Server and Microsoft SharePoint Server.
    Lessons
    Server and Service Dependencies
    Planning SIP Domains
    Installing Skype for Business Server
    Integrating Skype for Business Server with Exchange Server and SharePoint Server
    Lab : Configuring DNS and Simple URLs for Skype for Business Server
    Configuring the Required DNS Records and Simple URLs for Skype for Business Server
    Lab : Deploying Skype for Business Server
    Installing and Configuring Skype for Business Server
    Installing Skype for Business Server Certificates
    After completing this module, students will be able to:
    Identify the external dependencies for Skype for Business Server 2015.
    Identify the SIP domain requirements to ensure a successful implementation.
    Install Skype for Business Server.
    Describe how Skype for Business Server integrates with Exchange Server and SharePoint Server.
    Module 3: Administering Skype for Business Server 2015
    This module explains how to administer and manage Skype for Business Server by using Skype for Business Server Control Panel and the Skype for Business Server Management Shell. It also describes how to create useful Skype for Business scripts to automate processes. Additionally, it explains how to implement role-based access control (RBAC) in Skype for Business and how to use important Test cmdlets and tools to troubleshoot Skype for Business.
    Lessons
    Using Skype for Business Server Control Panel
    Using the Skype for Business Server Management Shell
    Implementing Role-Based Access Control
    Using Test Cmdlets
    Tools for Troubleshooting Skype for Business
    Lab : Using the Administrative Tools to Manage Skype for Business Server
    Installing the Skype for Business Administrative Tools on a Windows 10 Client
    Using Skype for Business Server Control Panel
    Using the Skype for Business Server Management Shell
    Lab : Using the Skype for Business Troubleshooting Tools
    Using Skype for Business Server Management Shell Cmdlets to Create an RBAC Structure
    Using the Centralized Logging Service
    Performing a Network Capture by Using Message Analyzer
    After completing this module, students will be able to:
    Use Skype for Business Server Control Panel.
    Use the Skype for Business Server Management Shell.
    Implement RBAC in Skype for Business 2015.
    Use important test cmdlets.
    Use various tools to troubleshoot Skype for Business.
    Module 4: Configuring Users and Clients in Skype for Business 2015
    This module explains how to configure users by using Skype for Business Server Control Panel and the Skype for Business Server Management Shell. It then describes how to deploy Skype for Business clients and explains the sign-in, registration, and authentication process for Skype for Business clients. It also explains how to configure in-band policies and group policies. Finally, it explains how to manage the Skype for Business Address Book.
    Lessons
    Configuring Users
    Deploying the Skype for Business Client
    Registration, Sign-In, and Authentication
    Configuring Skype for Business Client Policies
    Managing the Skype for Business Address Book
    Lab : Configuring Users and Clients in Skype for Business 2015
    Enabling Users for Skype for Business by Using the Management Shell
    Troubleshooting a User Sign-In Issue
    Lab : Configuring Policies and the Address Book in Skype for Business Server
    Configuring Client Policies
    Configuring the Address Book
    After completing this module, students will be able to:
    Configure users by using Skype for Business Server Control Panel and the Skype for Business Server Management Shell.
    Deploy Skype for Business clients.
    Explain the registration, sign-in, and authentication process for Skype for Business clients.
    Configure in-band policies and Group Policies.
    Describe how to manage the Skype for Business Address Book.
    Module 5: Configuring and Implementing Conferencing in Skype for Business 2015
    This modules describes Skype for Business conferencing features and modalities. It explains how to integrate Skype for Business Server 2015 with Office Online Server. It also explains how to plan for conferencing bandwidth utilization. Finally, it explains how to configure conferencing settings and policies.
    Lessons
    Introduction to Conferencing in Skype for Business 2015
    Integrating Skype for Business Server and Office Online Server
    Bandwidth Planning
    Configuring Conferencing Settings
    Lab : Installing and Configuring Office Online Server
    Installing Office Online Server
    Lab : Configuring Conferencing in Skype for Business Server
    Configuring, Assigning, and Validating Conferencing Policies
    After completing this module, students will be able to:
    Describe Skype for Business conferencing features and modalities.
    Integrate Skype for Business Server 2015 with Office Web Apps Server.
    Plan for conferencing bandwidth utilization.
    Configure conferencing settings and policies.
    Module 6: Implementing Additional Conferencing Options in Skype for Business Server 2015
    This module describes the conferencing lifecycle and explains how to administer it. It then explains how to use conferencing and meeting policies. It also explains how to deploy dial-in conferencing and configure the infrastructure for Lync Room System. Finally, it explains how to configure large meetings and Skype Meeting Broadcast.
    Lessons
    Overview of the Conferencing Lifecycle
    Designing and Configuring Audio/Video and Web Conferencing Policies
    Deploying Dial-In Conferencing
    Configuring an LRS
    Configuring Large Meetings and Skype Meeting Broadcasts
    Lab : Implementing and Troubleshooting Conferencing Policy
    Creating and Editing Conferencing Policies
    Troubleshooting Conferencing Policies
    Lab : Configuring Additional Conferencing Modalities
    Deploying Dial-In Conferencing
    Preparing for LRS Deployment
    After completing this module, students will be able to:
    Administer the conferencing lifecycle.
    Configure conferencing and meeting policies.
    Deploy dial-in conferencing.
    Configure the infrastructure for Lync Room System (LRS).
    Configure large meetings and Skype Meeting Broadcast.
    Module 7: Designing and Implementing Monitoring and Archiving in Skype for Business 2015
    This module describes the Monitoring Service components in Skype for Business Server. It then describes archiving and explains how to design an archiving policy. Finally, it explains how to implement archiving.
    Lessons
    Components of the Monitoring Service
    Overview of Archiving
    Designing an Archiving Policy
    Implementing Archiving
    Lab : Implementing Monitoring
    Enabling Monitoring Reports
    Lab : Implementing Archiving
    Enabling Skype for Business Server Archiving to Microsoft Exchange Server 2013
    After completing this module, students will be able to:
    Describe Monitoring Service components in Skype for Business Server.
    Implement monitoring.
    Design an archiving policy.
    Implement archiving.
    Module 8: Deploying Skype for Business 2015 External Access
    This module describes the components for external access. It then explains how to configure external access policies and security, how to configure certificates, and how to configure reverse proxy. Additionally, this module describes how to configure Skype for Business Server 2015 for mobile clients. Finally, it explains how to design and configure federation in Skype for Business Server.
    Lessons
    Overview of External Access
    Configuring External Access Policies and Security
    Configuring External Access Network and Certificates
    Configuring Reverse Proxy
    Designing Mobility in Skype for Business Server
    Designing Federation in Skype for Business Server
    Lab : Designing and Implementing External User Access
    Defining the Edge Server in the Topology
    Installing and Configuring the Edge Server
    Lab : Installing the Components for External Users
    Installing and Configuring Reverse Proxy
    Validate External Messaging
    After completing this module, students will be able to:
    Identify the components for external access.
    Configure external access policies and security.
    Configure external access network and certificates.
    Configure reverse proxy.
    Configure Skype for Business Server 2015 for mobile clients.
    Design and configure federation in Skype for Business Server.
    Module 9: Implementing Persistent Chat in Skype for Business 2015
    This module explains how to design a Skype for Business 2015 topology that includes Persistent Chat. It then explains how to deploy Persistent Chat in Skype for Business. Finally, it explains how to configure and manage Persistent Chat.
    Lessons
    Designing a Persistent Chat Server Topology
    Deploying Persistent Chat Server
    Configuring and Managing Persistent Chat
    Lab : Designing and Deploying Persistent Chat Server
    Configuring the Topology for Persistent Chat Server
    Installing Persistent Chat Server
    Registering a New Add-In
    Lab : Configuring and Using Persistent Chat
    Configuring Chat Rooms and Policies
    Validating a Persistent Chat Deployment
    Troubleshooting Persistent Chat
    After completing this module, students will be able to:
    Design a Skype for Business topology that includes Persistent Chat.
    Deploy Persistent Chat in Skype for Business.
    Configure and manage Persistent Chat in Skype for Business.
    Module 10: Implementing High Availability in Skype for Business 2015
    This module describes how to design and implement a high-availability solution for Front End Servers and Back End Servers in a Skype for Business Server environment. It also explains how to design and implement a high-availability solution for file stores, Edge Servers, Mediation Servers, Office Online server farms, and reverse proxy servers in a Skype for Business Server environment.
    Lessons
    Planning for Front End Pool High Availability
    Planning for Back End Server High Availability
    High Availability for Other Component Servers
    Lab : Pre-Lab Configuration
    Preparing for the Lab
    Lab : Implementing High Availability
    Managing Front End Pools
    Configuring Hardware Load Balancing
    After completing this module, students will be able to:
    Design and implement a high-availability solution for Front End Servers in a Skype for Business Server environment.
    Design and implement a high-availability solution for Back End Servers in a Skype for Business Server environment.
    Design and implement a high-availability solution for file stores, Edge Servers, Mediation Servers, Office Online Server farms, and reverse proxy servers in a Skype for Business Server environment.
    Module 11: Implementing Disaster Recovery in Skype for Business 2015
    This module describes the disaster recovery options in Skype for Business Server, such as Front End pool pairing and Persistent Chat Server stretched pools. It then explains how to implement disaster recovery in Skype for Business Server. Additionally, it describes the disaster recovery options for Persistent Chat, the Central Management store, the Location Information Service (LIS) database, and user data.
    Lessons
    Disaster Recovery Options in Skype for Business Server
    Implementing Disaster Recovery in Skype for Business Server
    Additional Disaster Recovery Options in Skype for Business Server
    Lab : Implementing and Performing Disaster Recovery
    Configuring Pool Pairing
    Perform Pool Failover and Failback
    After completing this module, students will be able to:
    Describe disaster recovery options in Skype for Business Server.
    Implement disaster recovery in Skype for Business Server.
    Describe the disaster recovery options for Persistent Chat, the Central Management store, the Location Information Service (LIS) database, and user data.
    Module 12: Integrating with Skype for Business Online
    This module describes Skype for Business Online features. It then explains how to prepare an on-premises environment for a hybrid Skype for Business deployment. It also explains how to configure a hybrid Skype for Business deployment.
    Lessons
    Overview of Skype for Business Online
    Preparing for a Hybrid Skype for Business Deployment
    Configuring a Hybrid Skype for Business Environment
    Lab : Designing a Hybrid Skype for Business Deployment
    Designing the Hybrid Skype for Business Environment
    After completing this module, students will be able to:
    Describe Skype for Business Online features.
    Prepare an on-premises environment for a hybrid Skype for Business deployment.
    Configure a hybrid Skype for Business deployment.
    Module 13: Planning and Implementing an Upgrade to Skype for Business Server 2015
    This module describe how to plan a side-by-side migration from Lync Server 2010 and Lync Server 2013 to Skype for Business Server 2015. It also explains how to perform an in-place upgrade from Lync Server 2013 to Skype for Business Server.
    Lessons
    Overview of Upgrade and Migration Paths
    Migrating to Skype for Business 2015
    In-Place Upgrade to Skype for Business Server 2015
    Lab : Performing an In-Place Upgrade of Lync 2013 to Skype for Business
    Install Skype for Business Administrative Tools
    Performing In-Place Upgrade from Lync Server 2013 to Skype for Business Server 2015
    After completing this module, students will be able to:
    Describe the supported migration and upgrade paths for Skype for Business Server.
    Perform an in-place upgrade of Lync Server 2013 to Skype for Business Server.
    Describe how to manage the user experience during an upgrade.

    http://www.it-training.pro/2016/12/25/70-333-deploying-enterprise-voice-with-skype-for-business-2015/


    Module 1: Introduction to Voice Workloads
    Designing a Skype for Business voice solution requires the understanding of many technologies. With Microsoft’s latest cloud based voice services, customers now have even more flexibility in deploying a voice solution for their enterprise, but with that flexibility comes further complexities that must be understood. In this module, you will learn about basic VoIP concepts, how they evolved from early telephony technologies, as well as Office 365 services and Microsoft’s entry into the voice world. You will also learn about on-premises and cloud based voice offerings now available as part of the Skype for Business product set.
    Lessons
    Voice Overview
    Designing Voice Workloads
    Skype for Business Ecosystem
    SIP Basics and Routing
    Lab : Customizing Your Lab Environment
    Configuring the On-Premises Organization
    After completing this module, students will be able to:
    Describe the different options available across various possible voice architectures with Skype for Business Server 2015 and Skype for Business Online.
    Explain how cloud technologies are changing the design, deployment, and management of voice architectures.
    Relate their prior experience to what they will learn throughout the course.
    Module 2: Assess Network and Voice Deployment Options
    In this module, you will learn how to perform a network readiness assessment for an implementation of Skype for Business Server 2015 or Skype for Business Online. This module coincides with the Skype Operations Framework (SOF) Plan phase. Specifically, this module aligns with the Envision, Assess, and Design stages. You will learn about Skype for Business Online and Skype for Business Server 2015 features and functionality. You will also learn the supported architectures for Skype for Business Online and Skype for Business Server 2015.
    Lessons
    Network Planning and Assessment
    Skype for Business Features and Functionality
    Plan your Cloud PBX Solution
    Lab : Configuring Identity Federation with Office 365
    Adding a Custom Domain and Enabling Directory Synchronization in Office 365
    Performing Directory Synchronization
    Installing and Configuring Active Directory Federation Services
    Enabling Single Sign-On with Office 365
    After completing this module, students will be able to:
    Describe the phases of network assessment.
    Identify Skype for Business Online plans.
    Describe the supported voice architectures.
    Choose a voice architecture for a given scenario.
    Module 3: Split Domain Configuration
    In this module, you will learn what is meant by the term split domain and what it describes relative to the Skype for Business product. You will also learn the benefits of split domain, the prerequisites needed to deploy this environment, and how to provision users once it’s been configured. Finally, you will learn to troubleshoot common issues.
    Lessons
    Split Domain Overview
    Split Domain Requirements
    Split Domain Deployments
    User Provisions and Migration
    Troubleshooting Split Domain Related Issues
    Lab : Setting up Split Domain with Skype for Business Online
    Setting up Split Domain with Skype for Business Online
    Moving Users to Skype for Business Online
    Verifying the Split Domain Skype for Business User Experience
    Managing Users in Skype for Business Online
    
    After completing this module, students will be able to deploy and configure an environment where users of a domain are split between using Skype for Business Server 2015 and Skype for Business Online.
    
    Module 4: Cloud PBX with PSTN Calling and Conferencing
    Cloud PBX is a Microsoft-based PBX solution offered in Office 365. Cloud PBX enables organizations to eliminate their existing PBX infrastructure and migrate PBX functionality, as well as existing telephone numbers, to Office 365. Public Switch Telephone Network (PSTN) Calling provides a PSTN connection for users via Microsoft Calling Plans. PSTN Conferencing has been integrated into Skype for Business Online Meetings capability in Office 365 which allow users to create, manage, and host their own online meetings with PSTN integration for easy dial-in access.
    Lessons
    Cloud PBX with PSTN Calling Features
    PSTN Conferencing and Meeting Features
    Skype for Business Server 2015 Dial-in Conferencing
    Lab : Configuring Cloud PBX with PSTN Calling
    Enabling Users for PSTN Calling in Skype for Business Online
    Using Online PSTN Calling Features
    Enabling Users for Cloud PSTN Conferencing
    Using PSTN Conferencing in Skype for Business Online
    After completing this module, students will be able to:
    
    Describe Cloud PBX with PSTN Calling features and conferencing
    Deploy and configure conference and meeting features
    Deploy and configure PSTN Conferencing  
    Module 5: Enterprise Voice (On-Premises)
    In this module, you will learn about Skype for Business Server 2015 Enterprise Voice. Enterprise Voice is a unified communications solution delivered by Skype for Business Server 2015. Enterprise Voice enables organizations to send and receive calls via the Publicly Switched Telephone Network (PSTN). You will learn how to configure voice components like Dial Plans, Voice Policies, and Routes that are an integral part of the Enterprise Voice solution.
    Lessons
    Designing Enterprise Voice
    Configuring Enterprise Voice
    Voice Routing
    Assigning Phone Numbers
    Client Configuration
    Unified Messaging
    Lab : Configuring Enterprise Voice
    Build a Regular Expression
    Configuring Dial Plans
    Configuring a Voice Policy, PSTN Usage, and Route
    Assigning User Dial Plans and Policies
    Test Voice Routing
    Configure the London Dial Plan
    After completing this module, students will be able to:
    Design and implement Skype for Business Enterprise Voice.
    Configure Enterprise Voice settings, including dial plans, voice policy, PSTN usage, voice routes, trunks, and numbering plans for DID and extensions.
    Describe Skype for Business Voice Routing.
    Integrate Exchange Unified Messaging with Skype for Business Server 2015.
    Configure Skype for Business client voice features.
    
    Module 6: PSTN Connectivity
    A key component to a successful organization is the ability to communicate between internal employees and customers and partners. In order for this to happen organizations need to bridge communications between their internal communications systems such as Skype for Business Server 2015 and the public switched telephone network by using an existing Public Branch Exchange (PBX), gateway, or Internet service provider (ISP). Connection to the PSTN enables enterprise users to make and receive calls from external numbers by using the same Skype for Business client used for internal calls. In addition, employees can leverage the broad range of Skype for Business features to improve their communications interactions with external users connected through the PSTN.
    Lessons
    Connecting to the PSTN
    Connecting to the Existing PBX
    M:N Interworking Routing
    Call Routing Reliability
    Call via Work
    Shared Line Appearance
    IP Phones
    Room Systems
    Mobile
    Lab : Configuring Integration with an IP-PBX
    Configuring Enterprise Voice Settings for London
    Configuring Inter-Trunk Routing
    Research Skype for Business Server 2015 Integration Settings
    Configuring IP-PBX Integration Settings
    After completing this module, students will be able to:
    Plan for the Mediation Server role.
    Connect Skype for Business Server 2015 to the PSTN.
    Implement M:N interworking routing.
    Define a reliable route for calls by using the PSTN.
    Describe Call via Work.
    Describe Shared Line Appearance.
    Module 7: Cloud PBX with On-Premises PSTN Connectivity using an Existing Deployment
    This module discusses the implementation and configuration of Cloud PBX with an on-premises PSTN with an existing deployment. With many options for implementation, students should be familiar with the different methods and connectivity options. Implementing Cloud PBX requires a tenant with Office 365 and a network infrastructure that can be utilized for users at an office or on a public internet connection. It is important to remember that dial-in conferencing needs to be implemented via PSTN Conferencing or Audio Conferencing Provider (ACP). On-Premises PSTN Connectivity with Cloud Connector Edition will be covered in the next module.
    Lessons
    Call Flows and Manageability
    Lab : Call Flows and Manageability
    * Exercise 1: Testing the Current PBX Calling Solution
    * Exercise 2: Enabling Cloud PBX with On-Premises PSTN Connectivity
    * Exercise 3: Testing Cloud PBX with On-Premises PSTN Connectivity
    After completing this module, students will be able to:
    * Explain Cloud PBX with On-Premises PSTN Connectivity architectures and scenarios
    Module 8: Cloud PBX with On-Premises PSTN Connectivity using Cloud Connector Edition
    Enterprises that have a voice solution on-premises that does not include Skype for Business Server 2015 or Lync Server 2013 can still integrate their current solution with Skype for Business Online by leveraging Cloud Connector Edition (CCE). It is important to choose the correct topology for CCE in order to support an organization’s voice requirements. This module will review the different supported topologies and provide guidance on the deployment process.
    Lessons
    Introduction to Cloud Connector Edition
    Planning PSTN Connectivity via Cloud Connector Edition
    Deploying Cloud Connector Edition
    Lab : Deploying Cloud Connector Edition
    Configuring the Lab Organization
    Prepare First Cloud Connector Edition High Availability Appliance
    Prepare Second Cloud Connector Edition High Availability Appliance
    Create Base VHDX for Cloud Connector Edition Virtual Machines
    Deploy First Cloud Connector Edition High Availability Appliance
    Configure Office 365 Tenant
    Test Cloud PBX with On-Premises PSTN Connectivity
    Deploy Second Cloud Connector Edition High Availability Appliance
    Complete and Testing Cloud Connector Edition High Availability
    Test Cloud Connector Edition Management Service Auto Recovery
    After completing this module, students will be able to:
    Know when Cloud Connector Edition is the right solution for an organization.
    Identify Cloud Connector Edition requirements.
    Deploy and manage Cloud Connector Edition.
    Module 9: Enhanced Calling Features and Device Requirements
    Enterprise Voice provides a number of specific on-premises features such as call parking, unassigned numbers, PSTN conferencing, and Response Groups. It also builds on the basic Enterprise Voice deployment scenario introduced earlier in the course. To use Enterprise Voice, you need to know about the various Enterprise Voice applications and how to implement and configure them. You will explore the Skype for Business Server Response Group Service (RGS) in some depth, including components such as RGS agent groups, RGS queues, hunt groups or basic workflows, and Interactive Voice response workflows. In addition, you should be able to describe the Attendant routing method.
    Lessons
    Call Park Service
    Managing Calls to Unassigned Numbers
    Delegation and Private Lines
    Response Group Services
    Location Information Services and E9-1-1
    Lab : Configuring Response Groups
    Configuring Agent Groups and Queues
    Configuring Workflows
    Verifying the Response Group Service Behavior
    Lab : Configuring Location Information Services and Managing Devices
    Creating Emergency Routes and PSTN Usages
    Configuring Number Manipulation on Trunks for Emergency Numbers
    Defining LIS Locations
    Experiencing LIS Features
    After completing this module, students will be able to:
    Explain the various voice features.
    Configure calling features that extend Skype for Business Enterprise Voice functionality.
    Configure call distribution with response groups.
    Make devices location aware with Location Information Service.
    Manage devices in Skype for Business Server 2015.
    Module 10: Network Requirements
    In this module, you will learn how to optimize voice communications on a network by planning for network consumption and implementing bandwidth optimizing technologies such as call admission control (CAC), quality of service (QoS), and software defined networks (SDN). You will also learn the media stacks available for Skype for Business Server 2015 and Skype for Business Online.
    Lessons
    Media Stacks
    Traffic Modeling
    Quality of Service
    Software-Defined Networking
    Overview of Call Admission Control
    Implementing Call Admission Control
    Software-Defined Networking
    Lab : Managing Voice Quality
    Entering information into the Skype for Business Bandwidth Calculator
    Reviewing Calculated Results
    Configuring Quality of Service
    Verifying the Quality of Service Application
    Configuring Call Admission Control to Manage Bandwidth
    Analyzing DSCP Values and Port Ranges for Prioritizing Network Traffic (Bonus Exercise
    After completing this module, students will be able to:
    Explain the media stacks available for Skype for Business Server 2015 and Skype for Business Online.
    Plan for network consumption.
    Optimize voice communications on a network.
    Implement bandwidth-optimizing technologies such as call admission control (CAC), quality of service (QoS), and software-defined networks (SDN).
    Module 11: Monitoring and Maintaining Voice Quality
    Asserting, achieving, and maintaining call quality are imperative for a successful Skype for Business deployment, especially for voice and conferencing workloads. This module will detail Microsoft’s Call Quality Methodology as both a process and toolset that can be used to achieve these goals. Call Quality Scorecard, along with its accompanying script and the Call Quality Dashboard, will be described as additional tools to measure and maintain call quality goals set by an organization. The module will also show how to leverage native Skype for Business tools and datasets to help troubleshoot and further refine deployment quality.
    Lessons
    Call Quality Methodology
    Call Quality Dashboard
    Monitoring Tools
    Usage Reports and Monitoring
    Lab : Deploying Call Quality Dashboard, Analyzing Reports, and Capturing KHI
    Installing the Skype Call Quality Dashboard
    Using the Skype Call Quality Dashboard
    Analyze Peer-to-Peer Session Detail Reports
    Troubleshoot Media Quality Reports
    Monitoring Synthetic Transactions
    Monitoring Server Health
    After completing this module, students will be able to:
    Leverage the Call Quality Methodology (CQM) and monitoring tools.
    Effectively define and assert call quality.
    Module 12: Voice Troubleshooting
    Troubleshooting is a basic skill that is required to support Skype for Business Server deployments. Skype for Business infrastructure can be deployed in a variety of topologies, as has been described throughout this course. Skype for Business administrators should be familiar with both the core tools and the troubleshooting methods that apply specifically to Skype for Business Online and Skype for Business Server 2015. This module will introduce tools and methodologies for troubleshooting Skype for Business client, Skype for Business Server 2015, and Skype for Business Online. Various scenarios will be explored to provide familiarity with some of the common issues administrators face.
    Lessons
    Troubleshooting Call Quality
    Troubleshooting Scenarios
    Troubleshooting Skype for Business Online Voice
    Troubleshooting IP Phones
    Lab : Troubleshoot Dial Plans, Routing, and Trunks
    Reviewing the Centralized Logging Service Components
    Using the CLS Logger Tool
    Tracing Fundamentals
    Identifying Dial Plan Misconfiguration
    Troubleshooting Voice Routing Issues
    After completing this module, students will be able to:
    Troubleshoot call quality.
    Identify troubleshooting tools.
    Identify troubleshooting scenarios.
    Use troubleshooting methodology to research, diagnose, and remediate call quality issues.
    Troubleshoot common Skype for Business Online client issues.
    Troubleshoot IP Phones.


    https://online.it-training.bg/online-it-training/microsoft-online-training/online-microsoft-mcsa-windows-server-2016-training/online-training-certification-microsoft-70-741-windows-server-2016


    Онлайн Курс Microsoft 70-741 Networking with Windows Server 2016

    IT-Training гарантира 100% удовлетворение от курса. За повече информация прегледайте политиката ни за 100% удовлетворение.

    Официален Microsoft курс (Microsoft Official Course - MOC 20741B) - Курсът е съгласно програмата на Microsoft и основната му цел е подготовка за сертифициране за Windows Server 2016 - Microsoft Certified Solutions Associate MCSA Windows Server 2016, както и за повишаване на професионалните умения и квалификация.

    Формат на курса: Онлайн, Microsoft Official Course, провежда се в реално време от сертифициран инструктор във виртуална класна стая.

    Език на курса: български (английски е наличен като опция).

    Метериали: в електронен формат, включени в цената.

    Пакет от услуги включени към курса:

    • онлайн обучение
    • сертификат за завършен курс
    • достъп до виртуален лаб
    • книги и учебни материали
    • достъп до примерни онлайн тестове
    • видео библиотека към курса - достъп до видео записи на сесиите към курса

    Курсът е подходящ за: начинаещи в Windows или системната администрация; желаещи да се сертифицират за MCSA Windows Server 2016; желаещи да научат Windows Server 2016 и да повишат професионалната си квалификация.

    Интерактивен формат: участниците имат възможност да участват в дискусии, да задават въпроси, двупосочна връзка с интруктора в реално време, чрез виртуалната класна стая. Онлайн формата се провежда в реално време по график, участниците са свързани наживо, за разлика от видео курсовете при онлайн формата не се презентира видео запис.

    График: изберете удобен за вас график от падащото меню.  Курса се провежда в удобно и съобразено с участниците време.

    Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

    Примерни тестове: позволяват да проверите подготовката си за  сертификационен изпит с примерни въпроси.

    Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

    Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

    Сертификат: всички участници получават сертификат за завършен курс.

    Метод на плащане: PayPal, банков превод, наложен платеж, брой.

    Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.


    Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

    След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

    Ако имате въпроси можете да се свържете с нас, чрез меню контакти.



    След завършване на курса студентите ще могат да:

    • Планиране и внедряване на IPv4 мрежа.
    • Внедряване на Dynamic Host Configuration Protocol (DHCP).
    • Внедряване на IPv6.
    • Внедряване на Domain Name System (DNS).
    • Внедряване и управление на  IP address management (IPAM).
    • Планиране за отдалечен достъп.
    • Внедряване на DirectAccess.
    • Внедряване на virtual private networks (VPNs).
    • Внедряване на мрежови услуги за регионални офиси.
    • Конфигуриране на разширени мрежови услуги.
    • Внедряване на Software Defined Networking.


    Съдържание на курса:


    Module 1: Планиране и внедряване на IPv4 мрежова свързаност

    Настоящият модул разяснява как да се планира и внедри IPv4 адресна схема за нуждите на организацията. Модулът също разяснява и как да се използват фундаменталните мрежови инструменти и техники за конфигуриране, диагностициране и отстраняване на неизправности в IPv4-базирани мрежи.

    Уроци

    • Planning IPv4 addressing
    • Configuring an IPv4 host
    • Managing and troubleshooting IPv4 network connectivity

    Lab : Planning an IPv4 network

    • Planning the IPv4 address assignments

    Lab : Implementing and troubleshooting an IPv4 network

    • Verifying the IPv4 communication
    • Troubleshooting IPv4

    След приключване на модула обучаемите ще могат да:

    • Plan IPv4 addressing.
    • Configure an IPv4 host.
    • Manage and troubleshoot IPv4 network connectivity.

    Module 2: Внедряване на DHCP

    Настоящият модул разяснява как да се планира и внедри DHCP за работа в IPv4 базирана мрежова инфраструктура.

    Уроци

    • Overview of the DHCP server role
    • Deploying DHCP
    • Managing and troubleshooting DHCP

    Lab : Implementing DHCP

    • Planning the DHCP server implementation
    • Implementing the DHCP configuration
    • Validating the DHCP implementation

    След приключване на модула обучаемите ще могат да:

    • Explain the DHCP server role.
    • Deploy DHCP.
    • Manage and troubleshoot DHCP.

    Module 3: Внедряване на IPv6

    Модулът разяснява как да се внедри IPv6, както и как да се интегрират заедно IPv6 и IPv4 мрежи.

    Уроци

    • Overview of IPv6 addressing
    • Configuring an IPv6 host
    • Implementing IPv6 and IPv4 coexistence
    • Transitioning from IPv4 to IPv6

    Lab : Configuring and evaluating IPv6 transition technologies

    • Reviewing the default IPv6 configuration
    • Implementing DHCPv6
    • Configuring network integration by using ISATAP
    • Configuring native IPv6 connectivity
    • Configuring 6to4 connectivity

    След приключване на модула обучаемите ще могат да:

    • Describe the features and benefits of IPv6.
    • Configure an IPv6 host.
    • Implement the coexistence between IPv4 and IPv6 networks.
    • Transition from an IPv4 network to an IPv6 network.

    Module 4: Внедряване на DNS

    Модулът разяснява как да се инсталира, конфигурира и диагностицира за грешки DNS услугата работеща в корпоративна мрежа.

    Уроци

    • Implementing DNS servers
    • Configuring zones in DNS
    • Configuring name resolution between DNS zones
    • Configuring DNS integration with Active Directory Domain Services (AD DS)
    • Configuring advanced DNS settings

    Lab : Planning and implementing name resolution by using DNS

    • Planning DNS name resolution
    • Implementing DNS servers and zones

    Lab : Integrating DNS with AD DS

    • Integrating DNS with AD DS

    Lab : Configuring advanced DNS settings

    • Configuring DNS policies
    • Validating the DNS implementation
    • Troubleshooting DNS

    След приключване на модула обучаемите ще могат да:

    • Implement DNS servers.
    • Configure zones in DNS.
    • Configure name resolution between DNS zones.
    • Configure DNS integration with AD DS.
    • Configure advanced DNS settings.

    Module 5: Внедряване и управление на IPAM

    Модулът разяснява как се внедрява и управлява технологията IPAM в Windows Server 2016. Модулът също разяснява как да се използва IPAM за управление на услуги като  DHCP и DNS.

    Уроци

    • Overview of IPAM
    • Deploying IPAM
    • Managing IP address spaces by using IPAM

    Lab : Implementing IPAM

    • Installing the IPAM Server feature
    • Provisioning the IPAM Server
    • Managing IP address spaces by using IPAM

    След приключване на модула обучаемите ще могат да:

    • Describe the IPAM functionality and components.
    • Deploy IPAM.
    • Manage IP address spaces by using IPAM.

    Module 6: Отдалечен достъп в Windows Server 2016

    Модулът разяснява стъпките при планиране за отдалечен достъп чрез Windows Server 2016 какво и внедряване на Web Application Proxy.

    Уроци

    • Overview of remote access
    • Implementing Web Application Proxy

    Lab : Implementing Web Application Proxy

    • Implementing Web Application Proxy
    • Validating the Web Application Proxy deployment

    След приключване на модула обучаемите ще могат да:

    • Describe remote access.
    • Implement Web Application Proxy.

    Module 7: Внедряване на DirectAccess

    Модулът разявнява внедряване и управление на DirectAccess технологията в Windows Server 2016.

    Уроци

    • Overview of DirectAccess
    • Implementing DirectAccess by using the Getting Started Wizard
    • Implementing and managing an advanced DirectAccess infrastructure

    Lab : Implementing DirectAccess by using the Getting Started Wizard

    • Verifying readiness for a DirectAccess deployment
    • Configuring DirectAccess
    • Validating the DirectAccess deployment

    Lab : Deploying an advanced DirectAccess solution

    • Preparing the environment for DirectAccess
    • Implementing the advanced DirectAccess infrastructure
    • Validating the DirectAccess deployment

    След приключване на модула обучаемите ще могат да:

    • Explain DirectAccess and how it works.
    • Implement DirectAccess by using the Getting Started Wizard.
    • Implement and manage an advanced DirectAccess infrastructure.

    Module 8: Внедряване на VPN

    Модулът разяснява методите за внедряване и управление на отдалечен достъп чрез Windows Server 2016 и използване на VPN технологии.

    Уроци

    • Planning VPNs
    • Implementing VPNs

    Lab : Implementing a VPN

    • Implementing a VPN
    • Validating the VPN deployment
    • Troubleshooting VPN access

    След приключване на модула обучаемите ще могат да:

    • Plan for a VPN solution.
    • Implement VPNs.

    Module 9: Внедряване на мрежова свързаност за отдалечени офиси

    Модулът разяснява технологиите за внедряване на услуги за регионални офиси.

    Уроци

    • Networking features and considerations for branch offices
    • Implementing Distributed File System (DFS) for branch offices
    • Implementing BranchCache for branch offices

    Lab : Implementing DFS for branch offices

    • Implementing DFS
    • Validating the deployment

    Lab : Implementing BranchCache

    • Implementing BranchCache
    • Validating the deployment

    След приключване на модула обучаемите ще могат да:

    • Describe the networking features and considerations for branch offices.
    • Implement DFS for branch offices.
    • Implement BranchCache for branch offices.

    Module 10: Конфигуриране на комплексни мрежови услуги

    Модулът е фокусиран върху внедряване на комплексни морежови инфраструктури.

    Уроци

    • Overview of high performance networking features
    • Configuring advanced Microsoft Hyper-V networking features

    Lab : Configuring advanced Hyper-V networking features

    • Creating and using Hyper-V virtual switches
    • Configuring and using the advanced features of a virtual switch

    След приключване на модула обучаемите ще могат да:

    • Describe the high performance networking enhancements in Windows Server 2016.
    • Configure the advanced Microsoft Hyper-V networking features.

    Module 11: Внедряване на Software Defined Networking

    Настоящият модул е фокурсиран върху внедряване на software defined networking.

    Уроци

    • Overview of Software Defined Networking
    • Implementing network virtualization
    • Implementing Network Controller

    Lab : Deploying Network Controller

    • Preparing to deploy Network Controller
    • Deploying Network Controller

    След приключване на модула обучаемите ще могат да:

    • Describe Software Defined Networking.
    • Implement network virtualization.
    • Implement Network Controller.


    Език на курса: български (английски е наличен като опция)

    Метериали: в електронен формат, включени в цената

    Лабораторна среда: не е включена в курса.

    цената включва 20 ч. онлайн обучение (теория).


    Метод на плащане: PayPal, банков превод, наложен платеж.

    За повече информация, моля използвайте формата за контакт.

    След потвърждаване на плащането, в рамките на 48 часа ще Ви изпратим достъп до видео библиотеката. Достъпът е неограничен за Вас от всичките Ви устройства. 


    Objectives:  By the end of the course, you should be able to meet the following objectives:
    •  Describe the software-defined data center 
    •  Deploy an ESXi host and create virtual machines 
    •  Describe the VMware vCenter Server™ architecture 
    •  Deploy a vCenter Server instance or VMware vCenter™ Server Appliance™ 
    •  Use vCenter Server to manage an ESXi host 
    •  Configure and manage vSphere infrastructure with VMware vSphere® Client™ and VMware vSphere® 
       Web Client 
    •  Configure virtual networks with vSphere standard switches 
    •  Use vCenter Server to manage various types of host storage: VMware vSphere® VMFS, NFS, VMware 
       Virtual SAN™, and VMware vSphere® Virtual Volumes™ 
    •  Manage virtual machines, templates, clones, and snapshots 
    •  Create a vApp 
    •  Describe and use the content library 
    •  Migrate virtual machines with VMware vSphere® vMotion® 
    •  Use VMware vSphere® Storage vMotion® to migrate virtual machine storage 
    •  Monitor resource usage and manage resource pools 
    •  Use VMware vRealize® Operations Manager™ to identify and solve issues through analytics and alerts 
    •  Manage VMware vSphere® High Availability and VMware vSphere® Fault Tolerance 
    •  Use VMware vSphere® Replication™ and VMware vSphere® Data Protection™ to replicate virtual 
       machines and perform data recovery 
    •  Use VMware vSphere® Distributed Resource Scheduler™ clusters to improve host scalability 
    •  Use VMware vSphere® Update Manager™ to apply patches and perform basic troubleshooting of ESXi 
       hosts, virtual machines, and vCenter Server operations
    •  Manage role-based access to the VMware® virtual infrastructure
    •  Use host profiles to manage ESXi configuration compliance and large-scale deployment
    •  Use vSphere distributed switches to scale networking
    •  Use VMware vSphere ® Network I/O Control to ensure network service availability
    •  Use VMware vSphere® Storage I/O Control to ensure storage availability
    •  Use policy-driven storage and VMware vSphere® Storage DRS™ to scale storage
    •  Use VMware vSphere® ESXi™ Image Builder CLI to create an ESXi image and use that image with 
       VMware vSphere® Auto Deploy™ to provision ESXi host Intended Audience:  Administrators with foundational knowledge of virtualization along with experienced system administrators, systems engineers, and system integrators willing to work hard to achieve superior vSphere skills with minimal time away from the office Prerequisites:  •  System administration experience on Microsoft Windows or Linux operating systems
    •  Understanding of concepts presented in the VMware Data Center Virtualization Fundamentals course or 
       VCA-DCV certification
    •  Hands-on experience with vSphere Outline:  

    1. Course Introduction
      • Introductions and course logistics
      • Course objectives
      • References and resources

    2. Software-Defined Data Center
      • Introduce components of the software-defined data center
      • Describe where vSphere fits into the cloud architecture
      • Install and use vSphere Client
      • Overview of ESXi

    3. Creating Virtual Machines
      • Introduce virtual machines, virtual machine hardware, and virtual machine files
      • Deploy a single virtual machine

    4. vCenter Server
      • Introduce the vCenter Server architecture
      • Deploy and configure vCenter Server Appliance
      • Use vSphere Web Client
      • Manage vCenter Server inventory objects and licenses

    5. Configuring and Managing Virtual Networks
      • Describe, create, and manage a standard switch
      • Describe and modify standard switch properties
      • Describe the NIC teaming of a standard switch port group

    6. Configuring and Managing Virtual Storage
      • Introduce storage protocols and device names
      • Configure ESXi with iSCSI and NFS storage
      • Create and manage VMFS datastores
      • Introduce Virtual SAN datastores
      • Introduce Virtual Volumes

    7. Virtual Machine Management
      • Use templates and cloning to deploy virtual machines
      • Modify and manage virtual machines
      • Create and manage virtual machine snapshots
      • Perform vSphere vMotion and vSphere Storage vMotion migrations
      • Create VMware vSphere® vApp(s)™
      • Introduce content libraries

    8. Access and Authentication Control
      • Control user access through roles and permissions
      • Discuss ESXi host access and authentication
      • Integrate ESXi with Active Directory

    9. Resource Management and Monitoring
      • Introduce virtual CPU and memory concepts
      • Describe methods for optimizing CPU and memory usage
      • Configure and manage resource pools
      • Use vCenter Server performance graphs and alarms to monitor resource usage

    10. vSphere HA and vSphere Fault Tolerance
      • Explain the vSphere HA architecture
      • Configure and manage a vSphere HA cluster
      • Use vSphere HA advanced parameters
      • Introduce vSphere Fault Tolerance
      • Enable vSphere Fault Tolerance on virtual machines
      • Introduce VMware vSphere® Replication™
      • Use vSphere Data Protection to back up and restore data

    11. Network Scalability
      • Create, configure, and manage vSphere distributed switches, network connections, and port groups
      • Discuss distributed switch features, such as private VLANs, discovery protocols, Network I/O Control, NetFlow, and port mirroring

    12. Host Scalability
      • Use host profiles to manage ESXi configuration compliance
      • Configure and manage a vSphere DRS cluster
      • Configure Enhanced vMotion Compatibility
      • Use vSphere HA and vSphere DRS together

    13. Storage Scalability
      • Describe VMware vSphere® Storage APIs - Array Integration and VMware vSphere® API for Storage Awareness™
      • Explain policy-driven storage
      • Add a storage policy to a virtual machine storage profile
      • Introduce vSphere Storage I/O Control
      • Create a datastore cluster
      • Configure vSphere Storage DRS

    14. Patch Management
      • Use vSphere Update Manager to manage ESXi patching
      • Install vSphere Update Manager and the vSphere Update Manager plug-in
      • Create patch baselines
      • Scan and remediate hosts

    15. VMware Management Resources
      • Describe VMware vSphere® Management Assistant
      • Configure vSphere Management Assistant
      • Discuss the VMware vSphere® Command-Line Interface command set
      • Perform command-line operations for host management, network management, storage management, and performance monitoring

    16. Installing VMware Components
      • Describe vCenter Linked Mode to manage multiple vCenter Server inventories
      • Introduce ESXi installation
      • Describe boot-from-SAN requirements
      • Describe vCenter Server hardware, software, and database requirements
      • Install vCenter Server (Windows-based)

    17. Host and Management Scalability
      • Configure and manage VMware vSphere® Distributed Power Management™
      • Use vSphere ESXi Image Builder CLI to create an ESXi installation image
      • Use vSphere Auto Deploy to deploy a stateless ESXi host

    Видео Курс Cisco CCNA Routing and Switching 200-105 ICND2 Interconnecting Cisco Networking Devices Part 2

    IT-Training Ви гарантира 100% за качеството на този курс. Ако по някаква причина обучението не отговори на очакванията ви, ние ви гарантираме възстановяване на сумата, която сте заплатили.

    Формат на курса: електронен формат, дигитална видео библиотека

    Език на курса: български (английски е наличен като опция)

    Метериали: видео курс

    Лабораторна среда: не е включена в курса.

    цената включва 20 уч.ч. видео обучение.

    Метод на плащане: PayPal, банков превод, пощенски запис


    За повече информация моля използвайте формата за контакт.

    След потвърждаване на плащането, в рамките на 48 часа ще Ви изпратим достъп до видео библиотеката. Достъпът е неограничен за Вас от всичките Ви устройства. 


    Prerequisites


    Before taking the ICND2 course, learners should be familiar with:


    Understanding network fundamentals

    Implementing local area networks

    Implementing Internet connectivity

    Managing network devices

    Securing network devices

    Implementing basic IPv6 connectivity

    Course Content


    This course will students with the knowledge and skills needed to install, configure, operate, and troubleshoot a small enterprise network. It will ensure that students understand and are ready to deploy the latest shifts in technologies and solutions as follows: • understanding of Quality of Service (QoS) elements and their applicability • how virtualized and cloud services will interact and impact enterprise networks • an overview of network programmability and the related controller types and tools that are available to support software defined network architectures A full suite of labs have been developed using the virtual IOS environment with flexible topologies that reinforce concepts with hands-on, guided discovery and challenge labs that align to each lesson module. Upon completing this course, you will be able to meet these objectives:


    Operate a medium-sized LAN with multiple switches supporting VLANs, trunking, switch stacking, chassis aggregation and spanning tree protocols

    Troubleshoot IP connectivity

    Configure and troubleshoot EIGRP and OSPF in IPv4 and IPv6 environments

    Define characteristics, functions and components of a WAN

    Describe SNMP, Syslog, and manage Cisco device configurations, IOS images and licenses

    Understand QoS, virtualization and cloud services, and network programmability related to WAN, access and core segments.


    Course Outline

    Module 1: Implement Scalable Medium-Sized Networks

    Module 2: Troubleshooting Basic Connectivity

    Module 3: Implementing an EIGRP-Based Solution

    Module 4: Summary Challenge

    Module 5: Implement a Scalable OSPF-Based Solution

    Module 6: Wide-Area Networks

    Module 7: Network Device Management and Security

    Module 8: Summary Challenge



    Видео Курс Microsoft 70-742 Identity with Windows Server 2016


    IT-Training Ви гарантира 100% за качеството на този курс. Ако по някаква причина обучението не отговори на очакванията ви, ние ви гарантираме възстановяване на сумата, която сте заплатили.

    Формат на курса: електронен формат, дигитална видео библиотека

    Език на курса: български (английски е наличен като опция)

    Метериали: видео курс

    Лабораторна среда: не е включена в курса.

    цената включва 20 уч.ч. видео записано обучение.


    Метод на плащане: PayPal, банков превод, наложен платеж, брой.

    Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.

    Ако имате въпроси можете да се свържете с нас, чрез меню контакти.

    След потвърждаване на плащането, в рамките на 48 часа ще Ви изпратим достъп до видео библиотеката. Достъпът е неограничен за Вас от всичките Ви устройства. 


    Course Outline

    Module 1: Installing and configuring domain controllers

    This module describes the features of AD DS and how to install domain controllers (DCs). It also covers the considerations for deploying DCs.

    Lessons

    • Overview of AD DS
    • Overview of AD DS domain controllers
    • Deploying a domain controller


    After completing this module, students will be able to:

    • Describe AD DS and its main components.
    • Describe the purpose and roles of domain controllers.
    • Describe the considerations for deploying domain controllers.

    Module 2: Managing objects in AD DS

    This module describes how to use various techniques to manage objects in AD DS. This includes creating and configuring user, group, and computer objects.

    Lessons

    • Managing user accounts
    • Managing groups in AD DS
    • Managing computer objects in AD DS
    • Using Windows PowerShell for AD DS administration
    • Implementing and managing OUs


    After completing this module, students will be able to:

    • Manage user accounts in AD DS.
    • Manage groups in AD DS.
    • Manage computer objects in AD DS.
    • Use Windows PowerShell for AD DS administration.
    • Implement and manage OUs.
    • Administer AD DS.

    Module 3: Advanced AD DS infrastructure management

    This module describes how to plan and implement an AD DS deployment that includes multiple domains and forests. The module provides an overview of the components in an advanced AD DS deployment, the process of implementing a distributed AD DS environment, and the procedure for configuring AD DS trusts.

    Lessons

    • Overview of advanced AD DS deployments
    • Deploying a distributed AD DS environment
    • Configuring AD DS trusts

    After completing this module, students will be able to:

    • Describe the components of an advanced AD DS deployment.
    • Deploy a distributed AD DS environment..
    • Configure AD DS trusts.

    Module 4: Implementing and administering AD DS sites and replication

    This module describes how to plan and implement an AD DS deployment that includes multiple locations. The module explains how replication works in a Windows Server 2016 AD DS environment.

    Lessons

    • Overview of AD DS replication
    • Configuring AD DS sites
    • Configuring and monitoring AD DS replication


    After completing this module, students will be able to:

    • Describe how AD DS replication works.
    • Configure AD DS sites to help optimize authentication and replication traffic.
    • Configure and monitor AD DS replication.


    Module 5: Implementing Group Policy

    This module describes how to implement a GPO infrastructure. The module provides an overview of the components and technologies that compose the Group Policy framework.

    Lessons

    Introducing Group Policy

    Implementing and administering GPOs

    Group Policy scope and Group Policy processing

    Troubleshooting the application of GPOs

    After completing this module, students will be able to:

    Explain what Group Policy is.

    Implement and administer GPOs.

    Describe Group Policy scope and Group Policy processing.

    Troubleshoot GPO application.


    Module 6: Managing user settings with Group Policy

    This module describes how to configure Group Policy settings and Group Policy preferences. This includes implementing administrative templates, configuring folder redirection and scripts, and configuring Group Policy preferences.

    Lessons

    Implementing administrative templates

    Configuring Folder Redirection, software installation, and scripts

    Configuring Group Policy preferences

    After completing this module, students will be able to:

    Implement administrative templates.

    Configure Folder Redirection, software installation, and scripts.

    Configure Group Policy preferences.


    Module 7: Securing Active Directory Domain Services

    This module describes how to configure domain controller security, account security, password security, and Group Managed Service Accounts (gMSA).

    Lessons

    Securing domain controllers

    Implementing account security

    Implementing audit authentication

    Configuring managed service accounts

    After completing this module, students will be able to:

    Secure domain controllers.

    Implement account security.

    Implement audit authentication.

    Configure managed service accounts (MSAs).


    Module 8: Deploying and managing AD CS

    This module describes how to implement an AD CS deployment. This includes deploying, administering, and troubleshooting CAs.

    Lessons

    Deploying CAs

    Administering CAs

    Troubleshooting and maintaining CAs

    After completing this module, students will be able to:

    Deploy CAs.

    Administer CAs.

    Troubleshoot and maintain CAs.


    Module 9: Deploying and managing certificates

    This module describes how to deploy and manage certificates in an AD DS environment. This involves deploying and managing certificate templates, managing certificate revocation and recovery, using certificates in a business environment, and implementing smart cards.

    Lessons

    Deploying and managing certificate templates

    Managing certificate deployment, revocation, and recovery

    Using certificates in a business environment

    Implementing and managing smart cards

    After completing this module, students will be able to:

    Deploy and manage certificate templates.

    Manage certificates deployment, revocation, and recovery.

    Use certificates in a business environment.

    Implement and manage smart cards


    Module 10: Implementing and administering AD FS

    This module describes AD FS and how to configure AD FS in a single-organization scenario and in a partner-organization scenario.

    Lessons

    Overview of AD FS

    AD FS requirements and planning

    Deploying and configuring AD FS

    Overview of Web Application Proxy

    After completing this module, students will be able to:

    Describe AD FS.

    Explain how to deploy AD FS.

    Explain how to implement AD FS for a single organization.

    Explain how to extend AD FS to external clients.

    Implement single sign-on (SSO) to support online services.


    Module 11: Implementing and administering AD RMS

    This module describes how to implement an AD RMS deployment. The module provides an overview of AD RMS, explains how to deploy and manage an AD RMS infrastructure, and explains how to configure AD RMS content protection.

    Lessons

    Overview of AD RMS

    Deploying and managing an AD RMS infrastructure

    Configuring AD RMS content protection

    After completing this module, students will be able to:

    Describe AD RMS.

    Deploy and manage an AD RMS infrastructure. .

    Configure AD RMS content protection.


    Module 12: Implementing AD DS synchronization with Microsoft Azure AD

    This module describes how to plan and configure directory syncing between Microsoft Azure Active Directory (Azure AD) and on-premises AD DS. The modules describes various sync scenarios, such as Azure AD sync, AD FS and Azure AD, and Azure AD Connect.

    Lessons

    Planning and preparing for directory synchronization

    Implementing directory synchronization by using Azure AD Connect

    Managing identities with directory synchronization

    After completing this module, students will be able to:

    Plan and prepare for directory synchronization.

    Implement directory synchronization by using Microsoft Azure Active Directory Connect (Azure AD Connect).

    Manage identities with directory synchronization.


    Module 13: Monitoring, managing, and recovering AD DS

    This module describes how to monitor, manage, and maintain AD DS to help achieve high availability of AD DS.

    Lessons

    Monitoring AD DS

    Managing the Active Directory database

    Active Directory backup and recovery options for AD DS and other identity and access solutions

    After completing this module, students will be able to:

    Monitor AD DS.

    Manage the Active Directory database.

    Describe the backup and recovery options for AD DS and other identity access solutions.


    Официален Cisco курс - Курсът е съгласно програмата на Cisco Systems и основната му цел е подготовка за сертифициране за CCNA Routing and Switching, както и за повишаване на професионалните умения и квалификация.

    Формат на курса: Онлайн, провежда се в реално време от сертифициран инструктор във виртуална класна стая.

    Език на курса: български (английски е наличен като опция).

    Метериали: в електронен формат, включени в цената.

    Пакет от услуги включени към курса:

    • онлайн обучение
    • сертификат за завършен курс
    • достъп до виртуален лаб
    • книги и учебни материали
    • достъп до примерни онлайн тестове
    • видео библиотека към курса - достъп до видео записи на сесиите към курса

    Курсът е подходящ за: начинаещи в мрежовите технологии или мрежовата администрация; желаещи да се сертифицират за CCNA Routing and Switching; желаещи да научат мрежови технологии базирани на Cisco Systems продуки и устройства и да повишат професионалната си квалификация.

    Интерактивен формат: участниците имат възможност да участват в дискусии, да задават въпроси, двупосочна връзка с интруктора в реално време, чрез виртуалната класна стая. Онлайн формата се провежда в реално време по график, участниците са свързани наживо, за разлика от видео курсовете при онлайн формата не се презентира видео запис.

    График: изберете удобен за вас график от падащото меню.  Курсът се провежда в удобно и съобразено с участниците време.

    Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

    Примерни тестове: позволяват да проверите подготовката си за  сертификационен изпит с примерни въпроси.

    Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

    Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

    Сертификат: всички участници получават сертификат за завършен курс.

    При отказ от достъп до лаб среда се предоставя отстъпка.

    Метод на плащане: PayPal, банков превод, наложен платеж, брой.

    Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.


    Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

    След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

    Ако имате въпроси можете да се свържете с нас, чрез меню контакти.


    Предпоставки

    • Преди да вземат участие в ICND1, участниците трябва да разполагат с:
    • Начална компютърна грамотност и умения за работа в Интернет
    • Основни умения свързани с компютърните операционни системи
    • Основни познания за IP адресите


    Описание на курса

    Настоящият курс ще предостави на студентите познания по QoS (Качество на услугите), виртуализация и облачни услуги, мрежова програмируемост свързана с WAN, access и core сегментите на мрежата.Ще предостави основно разбиране на мрежовите слоеве 1-3, които са отговорни за ядрото на routing и switching както и други напреднали технологии. Добавени са няколко нови теми, като, разирането на работата на защитните стени (firewalls), безжични контролери (wireless controllers) и точките за достъпп (access points), както и допълнителни теми фокусирани върху IPv6 и основите на мрежовата сигурност. Конфигурационните команди са представени, чре примери и практически примерни задачи в лабораторните упражнения. За курса е изграден изцяло нов пълноценен лаб, чрез виртуална IOS среда с гъвкави топологии, които приповтарят теоретичните концепции с практически упражнения, тясно обвързани с всеки отделен урок на курса. След завършване на настоящия курс, обучаемите ще могат да прилагат следните умения:

    • Описват мрежовите основи и изграждат малка локална мрежа
    • Осъществяват мрежова свързаност с интернет
    • Управляват сигурността на мрежовите устройства
    • Надграждат малки и средно големи мрежи с WAN свързаност
    • Описват основите на IPv6


    Съдържание на курса

    Module 1: Изграждане на малка мрежа

    Module 2: Изграждане на Internet свързаност

    Module 3: Практически модул с задача

    Module 4: Изграждане на средна по големина мрежа

    Module 5: Управление на мрежови устройства и сигурност

    Module 6: Практически модул с задача

    Module 7: Въведение в IPv6



    Видео Курс Microsoft 70-740 Installing Windows Server 2016

    IT-Training гарантира 100% удовлетворение от курса.  За повече информация прегледайте политиката ни за 100% удовлетворение.

    Формат на курса: електронен формат, дигитална видео библиотека

    Език на курса: български (английски е наличен като опция)

    Метериали: видео курс

    Лабораторна среда: не е включена в курса.

    цената включва 20 уч.ч. видео записано обучение.

    Допълнителна информация за съдържанието на курса можете на откриете на нашият сайт - http://www.it-training.pro


    След потвърждаване на плащането, в рамките на 48 часа ще Ви изпратим достъп до видео библиотеката. Достъпът е неограничен за Вас от всичките Ви устройства. 


    Умения след видео курса:

    Prepare and install Nano Server, a Server Core installation, and plan a server upgrade and migration strategy.

    Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes.

    Describe enterprise storage solutions, and select the appropriate solution for a given situation.

    Implement and manage Storage Spaces and Data Deduplication.

    Install and configure Microsoft Hyper-V.

    Deploy, configure, and manage Windows and Hyper-V containers.

    Describe the high availability and disaster recovery technologies in Windows Server 2016.

    Plan, create, and manage a failover cluster.

    Implement failover clustering for Hyper-V virtual machines.

    Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation.

    Create and manage deployment images.

    Manage, monitor, and maintain virtual machine installations.


    Съдържание на курса

    Module 1: Installing, upgrading, and migrating servers and workloads

    This module explains how to prepare and install Nano Server and Server Core. This module also explains how to upgrade and migrate server roles and workloads. Finally, this module explains how to choose an activation model based on your environment characteristics.

    Lessons

    Introducing Windows Server 2016

    Preparing and installing Nano Server and Server Core

    Preparing for upgrades and migrations

    Migrating server roles and workloads

    Windows Server activation models


    Module 2: Configuring local storage

    This module explains how to manage disks and volumes in Windows Server 2016.

    Lessons

    Managing disks in Windows Server 2016

    Managing volumes in Windows Server 2016


    Module 3: Implementing enterprise storage solutions

    This module describes the direct-attached storage (DAS), network-attached storage (NAS), and storage area networks (SANs). It also helps you understand Microsoft Internet Storage Name Service (iSNS) Server, data center bridging, and Multipath I/O (MPIO). Additionally, this module also compares Fibre Channel, Internet Small Computer System Interface (iSCSI), and Fibre Channel Over Ethernet (FCoE), and describes how to configure sharing in Windows Server 2016.

    Lessons

    Overview of direct-attached storage, network-attached storage, and storage area networks

    Comparing Fibre Channel, iSCSI, and FCoE

    Understanding iSNS, data centre bridging, and MPIO

    Configuring sharing in Windows Server 2016


    Module 4: Implementing Storage Spaces and Data Deduplication

    This module explains how to implement and manage Storage Spaces. This module also explains how to implement Data Deduplication.

    Lessons

    Implementing Storage Spaces

    Managing Storage Spaces

    Implementing Data Deduplication


    Module 5: Installing and configuring Hyper-V and virtual machines

    This module provides an overview of Hyper-V. This module also explains how to configure, manage, and install Hyper-V.

    Lessons

    Overview of Hyper-V

    Installing Hyper-V

    Configuring storage on Hyper-V host servers

    Configuring networking on Hyper-V host servers

    Configuring Hyper-V virtual machines

    Managing Hyper-V virtual machines


    Module 6: Deploying and managing Windows Server and Hyper-V containers

    This module provides and overview of containers in Windows Server 2016. It also explains how to deploy, install, configure, and manage containers in Windows Server 2016.

    Lessons

    Overview of containers in Windows Server 2016

    Deploying Windows Server and Hyper-V containers

    Installing, configuring, and managing containers


    Module 7: Overview of high availability and disaster recovery

    This module provides an overview of high availability, business continuity, and disaster recovery. It further explains how to plan high availability and disaster recovery solutions. Additionally, in this module you will know how to back up and restore the Windows Server 2016 operating system and data by using Windows Server Backup. Finally, you will learn about Windows Server 2016 high availability with failover clustering.

    Lessons

    Defining levels of availability

    Planning high availability and disaster recovery solutions with Hyper-V virtual machines

    Backing up and restoring the Windows Server 2016 operating system and data by using Windows Server B

    High availability with failover clustering in Windows Server 2016


    Module 8: Implementing and managing failover clustering

    This module explains how to plan, create, configure, maintain, and troubleshoot a failover cluster. This module also explains how to implement site high availability with stretch clustering.

    Lessons

    Planning a failover cluster

    Creating and configuring a new failover cluster

    Maintaining a failover cluster

    Troubleshooting a failover cluster

    Implementing site high availability with stretch clustering


    Module 9: Implementing failover clustering for Hyper-V virtual machines

    This module describes integrating Hyper-V virtual machines in a clustered environment. It also explains how to implement and maintain Hyper-V virtual machines on failover clusters. Additionally, this module also explains how to configure network health protection.

    Lessons

    Overview of integrating Hyper-V in Windows Server 2016 with failover clustering

    Implementing and maintaining Hyper-V virtual machines on failover clusters

    Key features for virtual machines in a clustered environment


    Module 10: Implementing Network Load Balancing

    This module provides an overview of NLB clusters. It also explains how to plan and configure an NLB cluster implementation.

    Lessons

    Overview of NLB clusters

    Configuring an NLB cluster

    Planning an NLB implementation


    Module 11: Creating and managing deployment images

    This module provides an introduction to deployment images. It also explains how to create and manage deployment images by using the Microsoft Deployment Toolkit (MDT). Additionally, it explains how to evaluate an organization’s requirements for server virtualization.

    Lessons

    Introduction to deployment images

    Creating and managing deployment images by using MDT

    Virtual machine environments for different workloads


    Module 12: Managing, monitoring, and maintaining virtual machine installations

    This module provides an overview on WSUS and explains the deployment options. It explains how to update management process with WSUS and also how to use Performance Monitor. Additionally, this module also provides an overview of PowerShell Desired State Configuration (DSC) and Windows Server 2016 monitoring tools. Finally, this module describes how to use Performance Monitor and monitor Event Logs.

    Lessons

    WSUS overview and deployment options

    Update management process with WSUS

    Overview of PowerShell DSC

    Overview of Windows Server 2016 monitoring tools

    Using Performance Monitor

    Monitoring Event Logs


    Video Training Microsoft 70-743 Upgrading your skills to Windows Server 2016

    Формат на курса: електронен формат, дигитална видео библиотека
    Език на курса: български (английски е наличен като опция)
    Метериали: в електронен формат, включени в цената
    Лабораторна среда: не е включена в курса.
    цената включва 20 уч.ч. онлайн обучение (теория).
    Sign-Up
    Метод на плащане: PayPal, банков превод, наложен платеж, брой.
    Заявка за издаване на фактура се приема към момента на записването на съответния курс.
    Фактура се издава в рамките на 7 дни от потвърждаване на плащането.
    За повече информация използвайте формата за контакт.
    Дати на провеждане: моля използвайте календара в основният ни сайт.
    Ще се свържем с Вас за потвърждаване на датите.

    След завършване на курса студентите ще могат да:
    Подготовка и инсталиране на Nano сървър, инсталация Server Core, и планират сървъра ъпгрейд и миграция стратегия.
    Опишете различните възможности за съхранение, включително маса формати преградни, основни и динамични дискове, файлови системи, виртуални твърди дискове, както и диск хардуер, и да обясни как да се управлява дискове и обеми.
    Опишете решения за съхранение на данни, и изберете подходящото решение за дадена ситуация.
    Прилагане и управление на складови помещения и Data Deduplication.
    Инсталиране и конфигуриране на Microsoft Hyper-V.
    Внедряване, конфигуриране и управление на Windows и Hyper-V контейнери.
    Опишете висока надеждност и възстановяване след бедствие технологии в Windows Server 2016.
    Планиране, създаване и управление на срив клъстер.
    Прилагане срив групиране за Hyper-V виртуални машини.
    Конфигуриране на Network Load Balancing (НЛБ) клъстер, и Плана за изпълнение на НЛБ.
    Създаване и управление на разполагане на изображения.
    Управление, наблюдение и поддържане на виртуална машина инсталации.

    Съдържание на курса
    Модул 1: Инсталиране, модернизация и мигриране на сървъри и работни натоварвания
    Този модул обяснява как да се подготви и да инсталирате Nano сървър и Server Core. Този модул обяснява как да се осъвремени и мигрира сървърни роли и натоварвания. И накрая, този модул обяснява как да се избере модел активиране на базата на вашите екологични характеристики.
    Уроци
    Въвеждане на Windows Server 2016
    Подготовка и инсталиране Nano сървър и Server Core
    Подготовка за ъпгрейди и миграции
    Мигриращите сървърни роли и натоварвания
    модели за активиране сървър за Windows
    Lab: Инсталиране и конфигуриране на Nano Сървър
    Изпълнителна Nano Сървър
    Завършване на пост-монтажни дейности на Nano сървър
    Извършване на дистанционното управление
    След завършване на този модул, учениците ще могат да:
    Изберете най-подходящата версия на операционната система Windows Server, и описват опциите за инсталиране и новите функции на Windows Server 2016.
    Подготовка и инсталиране на Nano сървър и Server Core.
    Помислете дали ъпгрейд или миграция е най-добрият подход, и да използвате инструменти, за да помогне да се определи ъпгрейд или миграция годност.
    Мигриране на сървърни роли и натоварвания в рамките на домейн и в различни домейни или гори.
    Изберете модел за активиране на базата на вашите екологични характеристики.
    Модул 2: Конфигуриране на местно съхранение
    Този модул обяснява как да се управлява дискове и обеми в Windows Server 2016.
    Уроци
    Управление на дискове в Windows Server 2016
    Управление на обеми в Windows Server 2016
    Lab: Управление на дискове и обеми в Windows Server 2016
    Създаване и управление на виртуални твърди дискове, като използвате Windows PowerShell
    Преобразуване на виртуални твърди дискове от .vhd да .vhdx
    Оразмеряване обем
    След завършване на този модул, учениците ще могат да:
    Управление на дискове в Windows Server 2016.
    Управление на обеми в Windows Server 2016.
    Модул 3: Прилагане на решения за съхранение на данни
    Този модул описва директно за съхранение на данни (DAS), мрежа-Attached Storage (NAS), и мрежи за съхранение (SANs). Той също така помага да се разбере Microsoft Internet съхранение на услугата за имена (iSNS) сървър, център за данни мостове, и Multipath I / O (MPIO). Освен това, този модул също сравнява Fibre Channel, Internet Small Computer Interface System (ISCSI), и Fibre Channel Over Ethernet (FCoE), и описва как да конфигурирате споделянето в Windows Server 2016.
    Уроци
    Преглед на пряк-за съхранение на данни, мрежово съхранение на данни, както и мрежи за съхранение
    Сравнявайки Fibre Channel, ISCSI, и FCoE
    Разбиране iSNS, център за данни мостове и MPIO
    Конфигуриране на споделяне в Windows Server 2016
    Lab: Планиране и конфигуриране на технологии и компоненти за съхранение
    Планиране на изискванията за съхранение
    Конфигуриране на ISCSI съхранение
    Конфигуриране и управление на инфраструктурата на акция
    След завършване на този модул, учениците ще могат да:
    Опишете DAS, NAS и SAN мрежи, и сценариите за ползване за всяка топология.
    Сравнете Fibre Channel, FCoE, с цел ISCSI и initiator.Describe iSNS, MPIO, център за данни мостове, и Windows Storage Server 2016 (две версии-Workgroup и Standard).
    Конфигуриране на сървър за съобщения блок (SMB) и мрежова файлова система (NFS) акции с помощта Server Manager и Windows PowerShell.

    Модул 4: Прилагане на складови помещения и Data Deduplication
    Този модул обяснява как да се прилага и управлява складови помещения. Този модул обяснява как да се прилагат данни Deduplication.
    Уроци
    Spaces изпълнение съхранение
    Управление на складови помещения
    Изпълнителна Данните Deduplication
    Lab: Spaces изпълнение съхранение
    Създаване на пространство за съхранение
    Активиране и конфигуриране на нивата за съхранение
    Lab: Прилагане Data Deduplication
    Инсталиране на данни Deduplication
    Конфигуриране на данни Deduplication
    След завършване на този модул, учениците ще могат да:
    Прилагане на складови помещения, като решение за съхранение на данни.
    Управление на складови помещения с помощта Server Manager и Windows PowerShell.
    Прилагане Data Deduplication.
    Модул 5: Инсталиране и конфигуриране на Hyper-V и виртуални машини
    Този модул осигурява преглед на Hyper-V. Този модул обяснява как да конфигурирате, управлявате и инсталиране на Hyper-V.
    Уроци
    Преглед на Hyper-V
    Инсталиране на Hyper-V
    Конфигуриране на съхранение на Hyper-V хост сървъри
    Конфигуриране на мрежи на Hyper-V хост сървъри
    Конфигуриране на Hyper-V виртуални машини
    Управление на Hyper-V виртуални машини
    Lab: Инсталиране и конфигуриране на Hyper-V
    Инсталиране на ролята на Hyper-V сървър
    Конфигуриране на Hyper-V настройки
    Създаване и конфигуриране на виртуална машина
    Управление на виртуална машина с помощта на PowerShell Direct
    След завършване на този модул, учениците ще могат да:
    Опишете Hyper-V и виртуализация.
    Подгответе се за инсталиране на Hyper-V ролята на.
    Конфигуриране на съхранение на Hyper-V хост сървъри.
    Конфигуриране на мрежови на Hyper-V хост сървъри.
    Конфигуриране на Hyper-V виртуални машини.
    Преместете виртуални машини от един хост на друг хост, използвайки PowerShell Direct за управление на виртуална машина, и управлява различни виртуални настройки на устройството.

    Модул 6: Внедряването и използването на Windows Server и Hyper-V контейнери
    Този модул осигурява и преглед на контейнери в Windows Server 2016. Той също така обяснява как да се разположи, инсталиране, конфигуриране и управление на контейнери в Windows Server 2016.
    Уроци
    Преглед на контейнери в Windows Server 2016
    Внедряването на Windows Server и Hyper-V контейнери
    Инсталиране, конфигуриране и управление на контейнери
    Lab: инсталиране и конфигуриране на контейнери
    Инсталиране и конфигуриране на контейнери Windows Server, като използвате Windows PowerShell
    Инсталиране и конфигуриране на контейнери Windows Server с помощта Docker
    След завършване на този модул, учениците ще могат да:
    Обяснете целта на Windows Server и Hyper-V контейнери.
    Внедряване и управление на Windows Server и Hyper-V контейнери.
    Инсталиране, конфигуриране и управление на контейнери.
    Модул 7: Преглед на висока надеждност и възстановяване след бедствие
    Този модул осигурява преглед на висока надеждност, непрекъснатост на бизнеса, и за възстановяване след бедствие. Освен това той обяснява как да се планира висока надеждност и решения за възстановяване след бедствие. Освен това, в този модул вие ще знаете как да направите резервно копие и възстановяване на Сървър 2016 операционната система и данните Windows с помощта на Windows Server Backup. И накрая, ще научите за Windows Server 2016 с висока наличност с срив групиране.
    Уроци
    Дефиниране на нива на достъпност
    Планиране на висока надеждност и възстановяване след бедствие решения с Hyper-V виртуални машини
    Архивиране и възстановяване на Сървър 2016 операционната система и данните Windows с помощта на Windows Server B
    Висока достъпност с срив групиране в Windows Server 2016
    Lab: планиране и прилагане на висока надеждност и възстановяване след бедствие разтвор
    Определяне на подходящо висока надеждност и възстановяване след бедствие разтвор
    Прилагане на миграцията съхранение
    Изпълнение на Hyper-V Replica
    След завършване на този модул, учениците ще могат да:
    Опишете висока надеждност, непрекъснатост на бизнеса, и за възстановяване след бедствие.
    План за висока надеждност и възстановяване след бедствие решения с Hyper-V виртуални машини.
    Архивиране и възстановяване на Hyper-V домакини, виртуални машини, Active Directory Domain Services (AD DS), и на файлове и уеб сървъри, като използвате Windows Server Backup.
    Опишете Windows Server 2016 с висока наличност с срив групиране.
    Модул 8: Прилагане и управление на срив групиране
    Този модул обяснява как да се планира, да създавате, конфигуриране, поддръжка и отстраняване на неизправности на срив клъстер. Този модул обяснява как да се прилагат сайт висока наличност с разтягане на клъстери.
    Уроци
    Планиране на срив на клъстерите
    Създаване и конфигуриране на нов срив на клъстерите
    Поддържането на срив на клъстерите
    Отстраняване на срив на клъстерите
    Изпълнение сайт висока наличност с разтягане на клъстери
    Lab: Прилагане на срив на клъстерите
    Създаване на срив на клъстерите
    Проверка на кворума настройки и добавяне на възел
    Lab: Управление на срив на клъстерите
    Evicting възел и проверка на кворума настройки
    Промяна на кворум от Disk свидетел File Share Witness, и определяне на гласуване възел
    Добавяне и премахване на дискове от клъстера
    След завършване на този модул, учениците ще могат да:
    Опишете изискванията и съображения инфраструктура за преодоляване на срив клъстер.
    Създаване и конфигуриране на нов срив клъстер.
    Монитор и поддържане срив клъстери.
    Отстраняване на срив клъстери чрез използване на различни инструменти като Performance Monitor, Event Viewer, и Windows PowerShell.
    Конфигуриране и прилагане на участък клъстер.
    Модул 9: Изпълнение срив групиране за Hyper-V виртуални машини
    Този модул описва интегрирането на Hyper-V виртуални машини в среда с клъстери. Той също така обяснява как да се внедри и поддържа Hyper-V виртуални машини върху срив клъстери. Освен това, този модул обяснява как да конфигурирате здравна защита на мрежата.
    Уроци
    Преглед на интегриране на Hyper-V в Windows Server 2016 с срив групиране
    Внедряване и поддържане на Hyper-V виртуални машини върху срив клъстери
    Основни характеристики за виртуални машини в среда с клъстери
    Lab: Прилагане срив групиране с Hyper-V
    Конфигуриране на срив клъстер за Hyper-V
    Конфигуриране на високо достъпна виртуална машина
    След завършване на този модул, учениците ще могат да:
    Обяснете на интеграцията на Hyper-V в Windows Server 2016 с срив групиране.
    Осъществяване и поддържане на Hyper-V виртуални машини върху срив клъстери.
    Опишете и конфигуриране на здравна защита на мрежата.
    Модул 10: Прилагане на мрежа за балансиране на натоварването
    Този модул осигурява преглед на Нова Люблянска Банка клъстери. Той също така обяснява как да се планира и да конфигурира изпълнение на клъстер NLB.
    Уроци
    Преглед на Нова Люблянска Банка клъстери
    Конфигуриране на НЛБ клъстер
    Планиране на изпълнението NLB
    Lab: Прилагане на НЛБ клъстер
    Въвеждането на НЛБ клъстер
    Конфигуриране и управление на НЛБ клъстера
    Валидиране висока наличност на клъстера NLB
    След завършване на този модул, учениците ще могат да:
    Опишете NLB и как тя работи.
    Конфигуриране на НЛБ клъстер.
    Опишете съображения за прилагане на НЛБ.
    Модул 11: Създаване и управление на изображения за разполагане
    Този модул предвижда въвеждане в снимки разполагане. Той също така обяснява как да създавате и управлявате разполагане на изображения с помощта на инструментариума на Microsoft Deployment (MDT). Освен това, той обяснява как да се оценят изискванията на организацията за виртуализация на сървърите.
    Уроци
    Въведение в изображения за разполагане
    Създаване и управление на изображения за разполагане с помощта MDT
    Виртуалната машина среда за различни натоварвания
    Lab: Използване MDT за разполагане на Windows Server 2016
    Инсталиране и конфигуриране на MDT
    Създаване и внедряване на изображение
    След завършване на този модул, учениците ще могат да:
    Обяснете целите на разполагане на изображения и инструментите, които се използват, за да разгърне и да ги поддържа.
    Прилагане и управление на разполагане на изображения с помощта на MDT.
    Оценят изискванията на тяхната организация за виртуализация на сървърите.
    Модул 12: Управление, мониторинг и поддържане на виртуална машина инсталации
    Този модул осигурява преглед на WSUS и обяснява опциите за разполагане. Тя обяснява как да се актуализира процес на управление с WSUS а също и как да се използва за следене на ефективността. Освен това, този модул също осигурява преглед на PowerShell желаното състояние Configuration (DSC) и сървър 2016 инструменти за наблюдение на Windows. И накрая, този модул се описва как да се използва за следене на ефективността и мониторинг на регистри на събития.
    Уроци
    Преглед WSUS и разгъване на опции
    процес на управление на обновяване с WSUS
    Преглед на PowerShell DSC
    Преглед на Windows Server 2016 инструменти за мониторинг
    Използването следене на ефективността
    Мониторинг на регистрите на събития
    Lab: Прилагане на WSUS и внедряването на актуализации
    изпълнение WSUS
    Конфигуриране на настройки за обновяване
    Приемане и разгръщане на актуализация чрез използване на WSUS
    Lab: Мониторинг и отстраняване на неизправности на Windows Server 2016
    Създаване на основния капацитет
    Идентифициране на източника на проблема с производителността
    Преглед и конфигуриране на централизирани регистри на събития
    След завършване на този модул, учениците ще могат да:
    Опишете целите на Windows Server Update Services (WSUS) и на изискванията за прилагане на WSUS.
    Управление на процеса на актуализация с WSUS.
    Опишете целите и ползите от PowerShell DSC.
    Опишете достъпно инструментите за контрол в Windows Server 2016.
    Опишете как да се използва за следене на ефективността.
    Опишете как да управлявате записите на събитията.



    IT-Training.pro
     предоставя  онлайн достъп до тестова среда, чрез използването на browser  (Chrome, Firefox, IE) върху PC, smartphone или tablet. Тестовата среда позволява проверка на знанията за съответния курс/сертификационен изпит. Резултатите от тестовете излизат в реално време, като можете да гледате сгрешените въпроси, кой е верният отговор, да се тествате отново и т.н. 

    Няма ограничения в това колко пъти можете да стартирате даден изпит.

    Ние се ангажираме да обновяваме базата данни с изпитни въпроси и файлове в рамките на вашият абонамент.

    Предоставяме достъп до тестовата среда за конкретно време - в продължение на 14 дни от получаването на достъпа.

    Можете да заявите по - дълго време за достъп, като просто добавите в кошницата си няколко броя от съответния сертификационен тест. В зависимост от избраното количество, системата ни ще генерира съответната отстъпка. Пример: 3 бр. x 7 дни ви предоставят 21 дни достъп.

    Можете да се тествате по всяко време. Системата ни работи 24x7, като при наличие на технически проблем, ще Ви компенсираме за пропуснатото време.

    Чрез онлайн тестовете можете да проверите своите умения и знания преди да се явите на сертификационен изпит.

    Доставката е изцяло в електронен формат. Можете да се откажете по всяко време. Ние ще ви върнем обратно заплатената такса съгласно условията ни за връщане. 



    IT-Training.pro предоставя  онлайн достъп до тестова среда, чрез използването на browser  (Chrome, Firefox, IE) върху PC, smartphone или tablet. Тестовата среда позволява проверка на знанията за съответния курс/сертификационен изпит. Резултатите от тестовете излизат в реално време, като можете да гледате сгрешените въпроси, кой е верният отговор, да се тествате отново и т.н. 

    Няма ограничения в това колко пъти можете да стартирате даден изпит.

    Ние се ангажираме да обновяваме базата данни с изпитни въпроси и файлове в рамките на вашият абонамент.

    Предоставяме достъп до тестовата среда за конкретно време - в продължение на 14 дни от получаването на достъпа.

    Можете да заявите по - дълго време за достъп, като просто добавите в кошницата си няколко броя от съответния сертификационен тест. В зависимост от избраното количество, системата ни ще генерира съответната отстъпка. Пример: 3 бр. x 7 дни ви предоставят 21 дни достъп.

    Можете да се тествате по всяко време. Системата ни работи 24x7, като при наличие на технически проблем, ще Ви компенсираме за пропуснатото време.

    Чрез онлайн тестовете можете да проверите своите умения и знания преди да се явите на сертификационен изпит.

    Доставката е изцяло в електронен формат. Можете да се откажете по всяко време. Ние ще ви върнем обратно заплатената такса съгласно условията ни за връщане.