Available courses

Microsoft 698 Installing and Configuring Windows 10

VMware Install Configure Manage ICM 6.7

Курс Microsoft 70-339-2 (20-339-2A) Advanced Technologies of SharePoint 2016


Формат на курса: Онлайн, воден от инструктор, виртуална класна стая

Език на курса: български (английски е наличен като опция).

Метериали: в електронен формат, включени в цената.

Пакет от услуги включени към курса:

  • онлайн обучение
  • достъп до виртуален лаб
  • книги и учебни материали
  • достъп до онлайн тестове
  • видео библиотека към курса - достъп до видео записи на сесиите към курса

График: изберете удобен за вас график от падащото меню.  Курса се провежда в удобно и съобразено с участниците време.

Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

Метод на плащане: PayPal, банков превод, наложен платеж, брой.

Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.

IT-Training Ви гарантира 100% за качеството на този курс. Ако по някаква причина обучението не отговори на очакванията ви, ние ви гарантираме възстановяване на сумата, която сте заплатили.

Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

Ако имате въпроси можете да се свържете с нас, чрез меню контакти.


At course completion

After completing this course, students will be able to:

  • Describe the core SharePoint 2016 architecture and its new and improved features.
  • Describe the key hybrid features in SharePoint 2016.
  • Plan and design a SharePoint 2016 environment to meet requirements for high availability and disaster recovery.
  • Plan and implement Business Connectivity Services and Secure Store Service.
  • Configure and manage productivity services for a SharePoint 2016 deployment.
  • Manage solutions in a SharePoint 2016 deployment.
  • Plan and configure social computing features.
  • Plan and configure web content management for an Internet-facing environment.
  • Plan and configure Enterprise Content Management in a SharePoint 2016 deployment.
  • Plan and configure business intelligence solutions.
  • Plan and configure work management, productivity, and collaboration platforms and features.
  • Perform an upgrade or migration to SharePoint 2016.


Официален Microsoft курс (Microsoft Official Course - MOC) - Курсът е съгласно програмата на Microsoft и основната му цел е подготовка за сертифициране за Microsoft Azure Administrator, както и за повишаване на професионалните умения и квалификация.


Формат на курса: Онлайн/присъствен, Microsoft Official Course, провежда се в реално време от сертифициран инструктор в  класна стая.

Език на курса: български (английски е наличен като опция).

Метериали: в електронен формат, включени в цената.

Пакет от услуги включени към курса:

  • онлайн обучение
  • сертификат за завършен курс
  • достъп до виртуален лаб
  • книги и учебни материали
  • достъп до примерни (demo) тестове
  • видео библиотека към курса - достъп до видео записи на сесиите към курса

Курсът е подходящ за: начинаещи в Azure или системната администрация; желаещи да се сертифицират за Azure System Administrator; желаещи да научат Microsoft Azure и да повишат професионалната си квалификация.

Интерактивен формат: участниците имат възможност да участват в дискусии, да задават въпроси, двупосочна връзка с интруктора в реално време, чрез виртуалната класна стая. Онлайн формата се провежда в реално време по график, участниците са свързани наживо, за разлика от видео курсовете при онлайн формата не се презентира видео запис.

График: изберете удобен за вас график от падащото меню.  Курса се провежда в удобно и съобразено с участниците време.

Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

Примерни тестове: позволяват да проверите подготовката си за  сертификационен изпит с примерни въпроси.

Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

Сертификат: всички участници получават сертификат за завършен курс.

При отказ от достъп до лаб среда се предоставя отстъпка.

Метод на плащане: PayPal, банков превод, наложен платеж, брой, карта.

Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.


Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

Ако имате въпроси можете да се свържете с нас, чрез меню контакти.



За този курс:

Този курс е предназначен за ИТ професионалисти, които са запознати с управлението и внедряването на IT решения в организацията за която работят, технологиите включват AD DS, виртуализационни технологии и приложения. Студентите обикновено работят за организации, които планират да използват част или всички инфраструктурни услуги на Azure. Този курс е предназначен за ИТ професионалисти, които искат да вземат изпита за сертифициране на Microsoft: 70-533 Implementing Microsoft Azure Infrastructure Solutions


Manage Azure subscriptions and resources

Analyze resource utilization and consumption

May include but not limited to: Configure diagnostic settings on resources; create baseline for resources; create and rest alerts; analyze alerts across subscription; analyze metrics across subscription; create action groups; monitor for unused resources; monitor spend; report on spend; utilize Log Search query functions; view alerts in Log Analytics

Implement and manage storage

Configure Azure files

May include but not limited to: Create Azure file share; create Azure File Sync service; create Azure sync group; troubleshoot Azure File Sync

Configure and manage virtual networks

Create connectivity between virtual networks

May include but not limited to: Create and configure VNET peering; create and configure VNET to VNET; verify virtual network connectivity; create virtual network gateway

Configure name resolution

May include but not limited to: Configure Azure DNS; configure custom DNS settings; configure DNS zones

Manage identities

Manage Azure Active Directory (AD)

May include but not limited to: Add custom domains; configure Azure AD Identity Protection, Azure AD Join, and Enterprise State Roaming; configure self-service password reset; implement conditional access policies; manage multiple directories; perform an access review

Implement and manage hybrid identities

May include but not limited to: Install and configure Azure AD Connect; configure federation and single sign-on; manage Azure AD Connect; manage password sync and writeback


This course covers the fundamentals of building IT infrastructure on the AWS platform. Students learn how to optimize the AWS Cloud by understanding how AWS services fit into cloud-based solutions. In addition, students explore AWS Cloud best practices and design patterns for architecting optimal IT solutions on AWS, and build a variety of infrastructures in guided, hands-on activities. The course also covers how to create fledgling architectures and build them into robust and adaptive solutions.

Level

Intermediate

Modality

Classroom training, hands-on labs

Length

3 days

This course is intended for:

  • Solutions architects
  • Solution design engineers

In this course, you will learn how to:

  • Make architectural decisions based on AWS architectural principles and best practices
  • Leverage AWS services to make your infrastructure scalable, reliable, and highly available
  • Leverage AWS Managed Services to enable greater flexibility and resiliency in an infrastructure
  • Make an AWS-based infrastructure more efficient to increase performance and reduce costs
  • Use the Well-Architected Framework to improve architectures with AWS solutions

We recommend that attendees of this course have the following prerequisites:

  • AWS Cloud Practitioner Essentials
  • Working knowledge of distributed systems
  • Familiarity with general networking concepts
  • Working knowledge of multi-tier architectures
  • Familiarity with cloud computing concepts

This course is delivered through a mix of:

  • Classroom training
  • Hands-on labs

This course allows you to test new skills and apply knowledge to your working environment through a variety of practical exercises.


Съдържание:

1 Domain 1.0: Designing highly available, cost-efficient, fault-tolerant, scalable systems

1.1 Identify and recognize cloud architecture considerations, such as fundamental components and effective designs.

• How to design cloud services

• Planning and design

• Monitoring and logging

• Familiarity with:

o Best practices for AWS architecture

o Developing to client specifications, including pricing/cost (e.g., on Demand vs. Reserved vs.

Spot; RTO and RPO DR Design)

o Architectural trade-off decisions (e.g., high availability vs. cost, Amazon Relational Database

Service (RDS) vs. installing your own database on Amazon Elastic Compute Cloud (EC2))

o Hybrid IT architectures (e.g., Direct Connect, Storage Gateway, VPC, Directory Services)

o Elasticity and scalability (e.g., Auto Scaling, SQS, ELB, CloudFront)


2 Domain 2.0: Implementation/Deployment

2.1 Identify the appropriate techniques and methods using Amazon EC2, Amazon S3, AWS Elastic

Beanstalk, AWS CloudFormation, AWS OpsWorks, Amazon Virtual Private Cloud (VPC), and AWS

Identity and Access Management (IAM) to code and implement a cloud solution.

• Configure an Amazon Machine Image (AMI)

• Operate and extend service management in a hybrid IT architecture

• Configure services to support compliance requirements in the cloud

• Launch instances across the AWS global infrastructure

• Configure IAM policies and best practices


3 Domain 3.0: Data Security

3.1 Recognize and implement secure practices for optimum cloud deployment and maintenance.

• AWS shared responsibility model

• AWS platform compliance

• AWS security attributes (customer workloads down to physical layer)

• AWS administration and security services

• AWS Identity and Access Management (IAM)

• Amazon Virtual Private Cloud (VPC)

• AWS CloudTrail

• Ingress vs. egress filtering, and which AWS services and features fit

• “Core” Amazon EC2 and S3 security feature sets

• Incorporating common conventional security products (Firewall, VPN)

• Design patterns

• DoS mitigation

• Encryption solutions (e.g., key services)

• Complex access controls (building sophisticated security groups, ACLs, etc.)

• Amazon CloudWatch for the security architect

• Trusted Advisor

• CloudWatch Logs


3.2 Recognize critical disaster recovery techniques and their implementation.

• Disaster recovery

o Recovery time objective

o Recovery point objective

o Amazon Elastic Block Store

• AWS Import/Export

• AWS Storage Gateway

• Amazon Route53

• Validation of data recovery method


4 Domain 4.0: Troubleshooting

• General troubleshooting information and questions


Курс AWS Certified DevOps Engineer - Professional


IT-Training Ви гарантира 100% за качеството на този курс. Ако по някаква причина обучението не отговори на очакванията ви, ние ви гарантираме възстановяване на сумата, която сте заплатили.

Формат на курса: присъствен, воден от инструктор, учебен център IT-Training.pro

Език на курса: български (английски е наличен като опция).

Метериали: в електронен формат, включени в цената.

Пакет от услуги включени към курса:

  • присъствено обучение
  • сертификат за завършен курс
  • достъп до виртуален лаб
  • книги и учебни материали
  • видео библиотека към курса - достъп до видео записи на сесиите към курса

Курсът е подходящ за: професионалисти в облачните технологии; желаещи да се сертифицират; желаещи да повишат професионалната си квалификация.

График: изберете удобен за вас график от падащото меню.  Курсът се провежда в удобно и съобразено с участниците време.

Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

Сертификат: всички участници получават сертификат за завършен курс.

Метод на плащане: PayPal, банков превод, наложен платеж, брой, карта.

За повече информация използвайте формата за контакт.


Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

Ако имате въпроси можете да се свържете с нас, чрез меню контакти.


Курсовете за AWS се провеждат от сертифициран AWS Instructor, като IT-Training.pro разполага с единствения сертифициран AWS инструктор в България.







In this course, you will learn how to:


Use the principal concepts and practices behind the DevOps methodology

Design and implement an infrastructure on AWS that supports one or more DevOps development projects

Use AWS CloudFormation and AWS OpsWorks to deploy the infrastructure necessary to create development, test, and production environments for a software development project

Use AWS CodeCommit and AWS CodeBuild to understand the array of options for enabling a continuous integration (CI) environment on AWS

Use AWS CodePipeline to design and implement a continuous integration and continuous delivery (CI/CD) pipeline on AWS

Use AWS CodeStar to manage all software development activities in one place

Implement several common continuous deployment (CD) use cases using AWS technologies, including blue/green deployment and A/B testing

Distinguish between the array of application deployment technologies available on AWS, including AWS CodeDeploy, AWS OpsWorks, AWS Elastic Beanstalk, Amazon Elastic Container Service (Amazon ECS), and Amazon Elastic Container Registry (Amazon ECR), and decide which technology best fits a given scenario

Use Amazon EC2 Systems Manager for patch management

Leverage automated testing in different stages of a CI/CD pipeline

Fine-tune the applications you deliver on AWS for high performance, and use AWS tools and technologies to monitor your application and environment for potential issues

Prerequisites

We recommend that attendees of this course have the following prerequisites:


Systems Operations on AWS or Developing on AWS

Working knowledge of one or more high-level programming languages, such as C#, Java, PHP, Ruby, or Python

Intermediate knowledge of administering Linux or Windows systems at the command-line level

Working experience with AWS using both the AWS Management Console and the AWS Command Line Interface (AWS CLI)


Domain 1: Continuous Delivery and Process Automation

1.1 Demonstrate an understanding of application lifecycle management:

 Application deployment management strategies such as rolling deployments and A/B.

 Version control, testing, build tools and bootstrapping.

1.2 Demonstrate an understanding of infrastructure configuration and automation.

1.3 Implement and manage continuous delivery processes using AWS services.

1.4 Develop and manage scripts and tools to automate operational tasks using the AWS SDKs, CLI,

and APIs.

Domain 2: Monitoring, Metrics, and Logging

2.1 Monitor availability and performance.

2.2 Monitor and manage billing and cost optimization processes.

2.3 Aggregate and analyze infrastructure, OS and application log files.

2.4 Use metrics to drive the scalability and health of infrastructure and applications.

2.5 Analyze data collected from monitoring systems to discern utilization patterns.

2.6 Manage the lifecycle of application and infrastructure logs

2.7 Leverage the AWS SDKs, CLIs and APIs for metrics and logging.

Domain 3: Security, Governance, and Validation

3.1 Implement and manage Identity and Access Management and security controls.

3.2 Implement and manage protection for data in-flight and at rest.

3.3 Implement, automate and validate cost controls for AWS resources.

3.4 Implement and manage automated network security and auditing.

3.5 Apply the appropriate AWS account and billing set-up options based on business requirements.

3.6 Implement and manage AWS resource auditing and validation.

3.7 Use AWS services to implement IT governance policies.

Domain 4: High Availability and Elasticity

4.1 Determine appropriate use of multi- Availability Zone versus multi-region architectures.

4.2 Implement self-healing application architectures.

4.3 Implement the most appropriate front-end scaling architecture.

4.4 Implement the most appropriate middle-tier scaling architecture.

4.5 Implement the most appropriate data storage scaling architecture.

4.6 Demonstrate an understanding of when to appropriately apply vertical and horizontal scaling

concepts.


Онлайн Курс  LPI LPIC-2 202 Linux Engineer


IT-Training Ви гарантира 100% за качеството на този курс. Ако по някаква причина обучението не отговори на очакванията ви, ние ви гарантираме възстановяване на сумата, която сте заплатили.

Формат на курса: Онлайн, воден от инструктор, виртуална класна стая

Език на курса: български (английски е наличен като опция)

Метериали: в електронен формат, включени в цената

Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

цената включва 40 уч.ч. онлайн обучение (теория и практика).

Сертификат: всички участници получават сертификат за завършен курс.

Метод на плащане: PayPal, банков превод, наложен платеж, брой.

Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.


Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

Ако имате въпроси можете да се свържете с нас, чрез меню контакти.


Съдържание: 
Topic 207: Domain Name Server
207.1 Basic DNS server configuration
Weight: 3
Description: Candidates should be able to configure BIND to function as a caching-only DNS server. This objective includes the ability to managing a running server and configuring logging.
Key Knowledge Areas:
BIND 9.x configuration files, terms and utilities
Defining the location of the BIND zone files in BIND configuration files
Reloading modified configuration and zone files
Awareness of dnsmasq, djbdns and PowerDNS as alternate name servers
The following is a partial list of the used files, terms and utilities:
/etc/named.conf
/var/named/
/usr/sbin/rndc
kill
host
dig
207.2 Create and maintain DNS zones
Weight: 3
Description: Candidates should be able to create a zone file for a forward or reverse zone and hints for root level servers. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.
Key Knowledge Areas:
BIND 9 configuration files, terms and utilities
Utilities to request information from the DNS server
Layout, content and file location of the BIND zone files
Various methods to add a new host in the zone files, including reverse zones
Terms and Utilities:
/var/named/
zone file syntax
resource record formats
dig
nslookup
host
207.3 Securing a DNS server
Weight: 2
Description: Candidates should be able to configure a DNS server to run as a non-root user and run in a chroot jail. This objective includes secure exchange of data between DNS servers.
Key Knowledge Areas:
BIND 9 configuration files
Configuring BIND to run in a chroot jail
Split configuration of BIND using the forwarders statement
Configuring and using transaction signatures (TSIG)
Awareness of DNSSEC and basic tools
Terms and Utilities:
/etc/named.conf
/etc/passwd
DNSSEC
dnssec-keygen
dnssec-signzone
Topic 208: Web Services
208.1 Implementing a web server
Weight: 4
Description: Candidates should be able to install and configure a web server. This objective includes monitoring the server’s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access.
Key Knowledge Areas:
Apache 2.x configuration files, terms and utilities
Apache log files configuration and content
Access restriction methods and files
mod_perl and PHP configuration
Client user authentication files and utilities
Configuration of maximum requests, minimum and maximum servers and clients
Apache 2.x virtual host implementation (with and without dedicated IP addresses)
Using redirect statements in Apache’s configuration files to customize file access
Terms and Utilities:
access logs and error logs
.htaccess
httpd.conf
mod_auth
htpasswd
AuthUserFile, AuthGroupFile
apache2ctl
httpd
208.2 Apache configuration for HTTPS
Weight: 3
Description: Candidates should be able to configure a web server to provide HTTPS.
Key Knowledge Areas:
SSL configuration files, tools and utilities
Ability to generate a server private key and CSR for a commercial CA
Ability to generate a self-signed Certificate from private CA
Ability to install the key and Certificate
Awareness of the issues with Virtual Hosting and use of SSL
Security issues in SSL use
Terms and Utilities:
Apache2 configuration files
/etc/ssl/, /etc/pki/
openssl, CA.pl
SSLEngine, SSLCertificateKeyFile, SSLCertificateFile, SSLCertificateChainFile
SSLCACertificateFile, SSLCACertificatePath
SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable
208.3 Implementing a proxy server
Weight: 2
Description: Candidates should be able to install and configure a proxy server, including access policies, authentication and resource usage.
Key Knowledge Areas:
Squid 3.x configuration files, terms and utilities
Access restriction methods
Client user authentication methods
Layout and content of ACL in the Squid configuration files
Terms and Utilities:
squid.conf
acl
http_access
208.4 Implementing Nginx as a web server and a reverse proxy
Weight: 2
Description: Candidates should be able to install and configure a reverse proxy server, Nginx. Basic configuration of Nginx as a HTTP server is included.
Key Knowledge Areas:
Nginx
Reverse Proxy
Basic Web Server
Terms and Utilities:
/etc/nginx/
nginx
Topic 209: File Sharing
209.1 SAMBA Server Configuration
Weight: 5
Description: Candidates should be able to set up a SAMBA server for various clients. This objective includes setting up Samba for login clients and setting up the workgroup in which a server participates and defining shared directories and printers. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested.
Key Knowledge Areas:
Samba 3 documentation
Samba configuration files
Samba tools and utilities
Mounting Samba shares on Linux
Samba daemons
Mapping Windows usernames to Linux usernames
User-Level and Share-Level security
Terms and Utilities:
smbd, nmbd
smbstatus, testparm, smbpasswd, nmblookup
net
smbclient
/etc/smb/
/var/log/samba/
209.2 NFS Server Configuration
Weight: 3
Description: Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.
Key Knowledge Areas:
NFS version 3 configuration files
NFS tools and utilities
Access restrictions to certain hosts and/or subnets
Mount options on server and client
TCP Wrappers
Awareness of NFSv4
Terms and Utilities:
/etc/exports
exportfs
showmount
nfsstat
/proc/mounts
/etc/fstab
rpcinfo
mountd
portmapper
Topic 210: Network Client Management
210.1 DHCP configuration
Weight: 2
Description: Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.
Key Knowledge Areas:
DHCP configuration files, terms and utilities
Subnet and dynamically-allocated range setup
Terms and Utilities:
dhcpd.conf
/var/log/daemon.log and /var/log/messages
dhcpd.leases
arp
dhcpd

210.2 PAM authentication
Description: The candidate should be able to configure PAM to support authentication using various available methods.
Key Knowledge Areas:
PAM configuration files, terms and utilities
passwd and shadow passwords
Terms and Utilities:
/etc/pam.d/
pam.conf
nsswitch.conf
pam_unix, pam_cracklib, pam_limits, pam_listfile

210.3 LDAP client usage
Description: Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.
Key Knowledge Areas:
LDAP utilities for data management and queries
Change user passwords
Querying the LDAP directory
Terms and Utilities:
ldapsearch
ldappasswd
ldapadd
ldapdelete

210.4 Configuring an OpenLDAP server
Description: Candidates should be able to configure a basic OpenLDAP server including knowledge of LDIF format and essential access controls. An understanding of the role of SSSD in authentication and identity management is included.
Key Knowledge Areas:
OpenLDAP
Access Control
Distinguished Names
Changetype Operations
Schemas and Whitepages
Directories
Object IDs, Attributes and Classes
Awareness of System Security Services Daemon (SSSD)
Terms and Utilities:
slapd
slapd.conf
LDIF
slapadd
slapcat
slapindex
/var/lib/ldap/
loglevel
Topic 211: E-Mail Services

211.1 Using e-mail servers
Description: Candidates should be able to manage an e-mail server, including the configuration of e-mail aliases, e-mail quotas and virtual e-mail domains. This objective includes configuring internal e-mail relays and monitoring e-mail servers.
Key Knowledge Areas:
Configuration files for postfix
Basic knowledge of the SMTP protocol
Awareness of sendmail and exim
Terms and Utilities:
Configuration files and commands for postfix
/etc/postfix/
/var/spool/postfix/
sendmail emulation layer commands
/etc/aliases
mail-related logs in /var/log/

211.2 Managing Local E-Mail Delivery
Description: Candidates should be able to implement client e-mail management software to filter, sort and monitor incoming user e-mail.
Key Knowledge Areas:
procmail configuration files, tools and utilities
Usage of procmail on both server and client side
Terms and Utilities:
~/.procmailrc
/etc/procmailrc
procmail
mbox and Maildir formats

211.3 Managing Remote E-Mail Delivery
Description: Candidates should be able to install and configure POP and IMAP daemons.
Key Knowledge Areas:
Courier IMAP and Courier POP configuration
Dovecot configuration
Terms and Utilities:
/etc/courier/
dovecot.conf

Topic 212: System Security
212.1 Configuring a router

Description: Candidates should be able to configure a system to perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.
Key Knowledge Areas:
iptables configuration files, tools and utilities
Tools, commands and utilities to manage routing tables.
Private address ranges
Port redirection and IP forwarding
List and write filtering and rules that accept or block datagrams based on source or destination protocol, port and address
Destination protocol, port and address
Save and reload filtering configurations
Awareness of ip6tables and filtering
Terms and Utilities:
/proc/sys/net/ipv4/
/etc/services
iptables

212.2 Securing FTP servers
Description: Candidates should be able to configure an FTP server for anonymous downloads and uploads. This objective includes precautions to be taken if anonymous uploads are permitted and configuring user access.
Key Knowledge Areas:
Configuration files, tools and utilities for Pure-FTPd and vsftpd
Awareness of ProFTPd
Understanding of passive vs. active FTP connections
Terms and Utilities:
vsftpd.conf
important Pure-FTPd command line options

212.3 Secure shell (SSH)
Description: Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys and configuring SSH for users. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.
Key Knowledge Areas:
OpenSSH configuration files, tools and utilities
Login restrictions for the superuser and the normal users
Managing and using server and client keys to login with and without password
Usage of multiple connections from multiple hosts to guard against loss of connection to remote host following configuration changes
Terms and Utilities:
ssh
sshd
/etc/ssh/sshd_config
/etc/ssh/
Private and public key files
PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication, Protocol

212.4 Security tasks
Description: Candidates should be able to receive security alerts from various sources, install, configure and run intrusion detection systems and apply security patches and bugfixes.
Key Knowledge Areas:
Tools and utilities to scan and test ports on a server
Locations and organizations that report security alerts as Bugtraq, CERT or other sources
Tools and utilities to implement an intrusion detection system (IDS)
Awareness of OpenVAS and Snort
Terms and Utilities:
telnet
nmap
fail2ban
nc
iptables

212.5 OpenVPN
Description: Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.
Key Knowledge Areas:
OpenVPN
Terms and Utilities:
/etc/openvpn/
openvpn

Онлайн Курс Microsoft 70-339-1 Planning and Administering SharePoint 2016


IT-Training Ви гарантира 100% за качеството на този курс. Ако по някаква причина обучението не отговори на очакванията ви, ние ви гарантираме възстановяване на сумата, която сте заплатили.

Формат на курса: Онлайн, воден от инструктор, виртуална класна стая

Език на курса: български (английски е наличен като опция).

Метериали: в електронен формат, включени в цената.

Пакет от услуги включени към курса:

онлайн обучение

достъп до виртуален лаб

книги и учебни материали

достъп до онлайн тестове

видео библиотека към курса - достъп до видео записи на сесиите към курса

График: изберете удобен за вас график от падащото меню.  Курса се провежда в удобно и съобразено с участниците време.

Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

Метод на плащане: PayPal, банков превод, наложен платеж, брой.

Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.


Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

Ако имате въпроси можете да се свържете с нас, чрез меню контакти.


At course completion

After completing this course, students will be able to:

    Describe the key features of SharePoint 2016.

    Design an information architecture for a SharePoint 2016 deployment.

    Design a logical architecture for a SharePoint 2016 deployment.

    Design the physical architecture for a SharePoint 2016 deployment.

    Install and configure SharePoint 2016.

    Create and configure web applications and site collections.

    Plan and configure service applications for a SharePoint 2016 deployment.

    Manage users and permissions, and secure content in a SharePoint 2016 deployment.

    Configure authentication in a SharePoint 2016 deployment.

    Configure platform and farm-level security in a SharePoint 2016 deployment.

    Manage information taxonomy in SharePoint web applications and site collections.

    Configure and manage user profiles and audiences.

    Configure and manage the search experience in SharePoint 2016.

    Monitor, maintain, and troubleshoot a SharePoint 2016 deployment.

          Key components of a SharePoint deployment

          New features in SharePoint 2016

          SharePoint 2016 deployment options

          Identify the architecture and capabilities of SharePoint 2016.

          Identify new and deprecated features in SharePoint 2016.

          Identify deployment options for SharePoint 2016.

          Identifying business requirements

          Understanding business requirements

          Organizing information in SharePoint 2016

          Planning for discoverability

          Identifying site columns and content types

          Designing a business taxonomy

          Explain how understanding business requirements drives the design of an organizational information architecture.

          Describe the key components available in SharePoint 2016 to deploy an information architecture.

          Plan for discoverability as part of an information architecture deployment.

          Overview of the SharePoint 2016 logical architecture

          Documenting your logical architecture

          Planning a logical architecture

          Producing a logical architecture diagram

          Map business requirements to SharePoint 2016 architecture components.

          Explain the importance of documentation and describe the options for documenting the logical architecture.

          Designing physical components for SharePoint deployments

          Designing supporting components for SharePoint deployments

          SharePoint farm topologies

          Mapping a logical architecture design to a physical architecture design

          Designing a physical architecture

          Developing a physical architecture design diagram

          Describe the requirements for the physical components that are needed for a SharePoint 2016 deployment.

          Describe the requirements for the supporting components that are needed for a successful SharePoint 2016 deployment.

          Identify SharePoint farm topologies.

          Map a logical architecture design to a physical architecture design.

          Installing SharePoint 2016

          Scripting installation and configuration of SharePoint

          Configuring SharePoint 2016 farm settings

          Provisioning a SharePoint 2016 farm

          Configuring incoming email

          Configuring outgoing email

          Configuring integration with Office Online Server

          Install SharePoint 2016.

          Deploy and configure SharePoint 2016.

          Script the installation and configuration of SharePoint 2016.

           Configure SharePoint 2016 farm settings.

           Creating web applications

           Configuring web applications

           Creating and configuring site collections

          Creating a web application

          Configuring a web application

          Creating and configuring site collections

          Creating a site collection in a new content database

          Using Fast Site Collection Creation

          Create web applications.

          Configure web applications.

          Create and configure site collections.

          Introduction to the service application architecture

          Creating and configuring service applications

          Provisioning a Managed Metadata Service application with Central Administration

          Provisioning a Managed Metadata Service application with Windows PowerShell

          Configuring the Word Automation Services service application for document conversion

          Configuring service application proxy groups

          Explain the key components and topologies for a SharePoint 2016 service application architecture.

          Plan for service accounts and service application dependencies.

          Understand the purpose of mapping service applications to business requirements.

          Describe how to provision and manage SharePoint 2016 service applications

          Configuring authorization in SharePoint 2016

          Managing access to content

          Creating a web-application policy

          Creating and managing SharePoint groups

          Creating custom permission levels

          Managing permissions and inheritance

          Managing site-collection security

          Enabling anonymous access to a site

          Manage users and permissions in SharePoint 2016.

          Manage access to content in SharePoint 2016.

          Overview of authentication

          Configuring federated authentication

          Configuring server-to-server authentication

          Configuring Microsoft SharePoint 2016 to use federated identities

          Configuring Active Directory Federation Services (AD FS) to enable a web application a relying party

          Configuring SharePoint to trust AD FS as an identity provider

          Configuring a web application to use the AD FS identity provider

          Explain the authentication infrastructure of SharePoint 2016.

          Configure claims providers and identity federation for SharePoint 2016.

          Configure server-to-server authentication for SharePoint 2016.

          Securing the platform

          Configuring farm-level security

          Configuring SharePoint Server communication security

          Hardening a SharePoint server farm

          Configuring blocked file types

          Configuring Web Part security

          Implementing security auditing

          Secure a SharePoint 2016 deployment at the platform level.

          Configure farm-level security settings for a SharePoint 2016 deployment.

          Managing content types

          Understanding managed metadata

          Configuring the managed metadata service

          Creating content types for propagation

          Publishing content types across site collections

          Configuring the managed metadata service

          Creating term sets and terms

          Consuming term sets

          Create and manage content types and content-type propagation.

          Explain how to implement managed metadata in SharePoint web applications and site collections.

          Configure the managed metadata service application in SharePoint 2016.

          Configuring the User Profile Service Application

          Managing user profiles and audiences

          Configuring the User Profile Service Application

          Configuring directory import and synchronization

          Configuring My Sites

          Configuring audiences

          Configure the User Profile service application.

          Manage user profiles and audiences.

          Understanding the Search Service Application architecture

          Configuring Enterprise Search

          Managing Enterprise Search

          Configuring the Search Service Application

          Configuring a file share content source

          Configuring a local SharePoint content source

          Creating a search center

          Configuring a result source and a query rule

          Customizing the search experience

          Creating and deploying a thesaurus

          Configuring entity extractors and refiners

          Managing query spelling correction

          Describe the Search service architecture in SharePoint 2016.

          Configure the Search service in SharePoint 2016.

          Manage the search experience in SharePoint 2016.

          Monitoring a SharePoint 2016 environment

          Tuning and optimizing a SharePoint 2016 environment

          Planning and configuring caching

          Troubleshooting a SharePoint 2016 environment

          Configuring usage and health data collection

          Configuring Sharepoint diagnostic logging

          Configuring Health Analyzer rules

          Reviewing usage and health data

          Analyzing network traffic

          Analyzing SharePoint page performance

          Develop and implement a monitoring plan for a SharePoint 2016 environment.

          Tune and optimize a SharePoint 2016 server farm on an ongoing basis.

          Plan and configure caching to improve the performance of a SharePoint 2016 deployment.


          Онлайн Курс Cisco CCNA Routing and Switching 200-105 ICND2 Interconnecting Cisco Networking Devices Part 2


          IT-Training Ви гарантира 100% за качеството на този курс. Ако по някаква причина обучението не отговори на очакванията ви, ние ви гарантираме възстановяване на сумата, която сте заплатили.

          Формат на курса: Онлайн, воден от инструктор, виртуална класна стая

          Цел на курса: Подготовка за сертификат, повишаване на квалификацията.

          Език на курса: български (английски е наличен като опция)

          Метериали: в електронен формат, включени в цената

          Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

          цената включва 40 уч.ч. онлайн обучение (теория и практика).

          Пакет от услуги включени към курса:

          • онлайн обучение
          • достъп до виртуален лаб
          • книги и учебни материали

          При отказ от достъп до лаб среда се предоставя отстъпка.

          Метод на плащане: PayPal, банков превод, наложен платеж, брой.


          За повече информация използвайте формата за контакт.


          Дати на провеждане: моля използвайте календара в основният ни сайт.

          Ще се свържем с Вас за потвърждаване на датите.


          Предпоставки:

          Преди се запишат за  участие в ICND2, учащите трябва да бъдат запознати с:

          Разбиране на мрежовите основи (курс ICND1)

          Внедряване на локални мрежи

          Изграждане на интернет свързаност

          Управление на мрежови устройства

          Обезпечаване и поддръжка  на мрежови устройства

          Изграждане на основна IPv6 свързаност

          Съдържание на учебната дисциплина

          Този курс ще предостави на студентите знанията и уменията, необходими за инсталиране, конфигуриране, поддържане, и отстраняване на проблеми в малка корпоративна мрежа. Това ще гарантира, че учениците разбират и са готови за внедряване на най-новите промени в мрежовите технологии и решения, както следва:

          • разбиране приципите зад гарантиране на качеството на услугата (QoS) и внедряване

          • как виртуализирани и облачни услуги ще си взаимодействат и въздействат с корпоративни мрежи

          • преглед на решение за изграждане на програмируеми мрежи, и свързаните с тях видове и инструменти, които са на разположение за подпомагане на софтуерни дефинирани мрежови архитектури пълен набор от лаборатории са разработени с помощта на виртуална IOS среда с гъвкави топологии


          След завършване на този курс, вие ще бъдете в състояние да изпълни тези цели:


          Работете със средни по размер LAN мрежи с множество switch-ове, поддържащи VLANs, trunking, switch stacking, chassis aggregation и spanning tree protocols

          Отстраняване на неизправности в IP свързаност

          Конфигуриране и отстраняване на неизправности с EIGRP и OSPF в IPv4 и IPv6 среда

          Определяне на характеристиките, функциите и компонентите на WAN

          Внедряване на  SNMP, Syslog, и управление на конфигурациите на Cisco устройствата, IOS images и лицензи

          Разберане на QoS, виртуализация и облачни услуги, както и програмируеми мрежови технологии, свързани с WAN, достъп и основните сегменти.


          Съдържание на курса

          Модул 1: Внедряване на Scalable средни по размер мрежи

          Модул 2: Отстраняване на неизправности и изграждане на Basic Connectivity

          Модул 3: Прилагане на EIGRP-базирано решение

          Модул 4: Challenge module

          Модул 5: Прилагане на Scalable OSPF-базирано решение

          Модул 6: Внедряване на широколентов мрежов достъп

          Модул 7: Управление на мрежови устройства и внедряване на сигурност

          Модул 8: Final Challenge module



          IT-Training.pro е Authorized Training Partner на Linux Professional Institute. Всички LPIC курсове са съгласно официалната сертификационна програма с гарантирано качество и успеваемост. 

          Формат на курса: Присъствен, провежда се в реално време от сертифициран инструктор в учебна зала. Курсът е част от сертификационната програма на Linux Professional Institute и служи за подготовка за сертифициране за ниво LPIC-OT DevOps, както и за професионално развитие като Linux System Administrator и Linux DevOps IT специалист.

          Език на курса: български (английски е наличен като опция).

          Метериали: в електронен формат, включени в цената.

          Пакет от услуги включени към курса:

          • обучение в учебна зала
          • сертификат за завършен курс
          • достъп до виртуален лаб
          • книги и учебни материали
          • достъп до онлайн тестове
          • видео библиотека към курса - достъп до видео записи на сесиите към курса

          Курсът е подходящ за: Linux администратори; желаещи да се сертифицират за LPIC-OT DevOps Tools Engineer; желаещи да научат Linux DevOps tools и да повишат професионалната си квалификация.

          Интерактивен формат: участниците имат възможност да участват в дискусии, да задават въпроси, двупосочна връзка с интруктора в реално време, чрез виртуалната класна стая. Онлайн формата се провежда в реално време по график, участниците са свързани наживо, за разлика от видео курсовете при онлайн формата не се презентира видео запис.

          График: изберете удобен за вас график от падащото меню.  Курсът се провежда в удобно и съобразено с участниците време.

          Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

          Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

          Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

          Сертификат: всички участници получават сертификат за завършен курс.

          Метод на плащане: PayPal, банков превод, наложен платеж, брой, карта.

          Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.


          Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

          След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

          Ако имате въпроси можете да се свържете с нас, чрез меню контакти.


          Съдържание:

          Topic 701: Software Engineering

          701.1 Modern Software Development


          Description: Candidates should be able to design software solutions suitable for modern runtime environments. Candidates should understand how services handle data persistence, sessions, status information, transactions, concurrency, security, performance, availability, scaling, load balancing, messaging, monitoring and APIs. Furthermore, candidates should understand the implications of agile and DevOps on software development.


          Key Knowledge Areas:


          • Understand and design service based applications
          • Understand common API concepts and standards
          • Understand aspects of data storage, service status and session handling
          • Design software to be run in containers
          • Design software to be deployed to cloud services
          • Awareness of risks in the migration and integration of monolithic legacy software
          • Understand common application security risks and ways to mitigate them
          • Understand the concept of agile software development
          • Understand the concept of DevOps and its implications to software developers and operators

          The following is a partial list of the used files, terms and utilities:

          • REST, JSON
          • Service Orientated Architectures (SOA)
          • Microservices
          • Immutable servers
          • Loose coupling
          • Cross site scripting, SQL injections, verbose error reports, API authentication, consistent enforcement of transport encryption
          • CORS headers and CSRF tokens
          • ACID properties and CAP theorem

           


          701.2 Standard Components and Platforms for Software


          Description: Candidates should understand services offered by common cloud platforms. They should be able to include these services in their application architectures and deployment toolchains and understand the required service configurations. OpenStack service components are used as a reference implementation.


          Key Knowledge Areas:


          • Features and concepts of object storage
          • Features and concepts of relational and NoSQL databases
          • Features and concepts of message brokers and message queues
          • Features and concepts of big data services
          • Features and concepts of application runtimes / PaaS
          • Features and concepts of content delivery networks

          The following is a partial list of the used files, terms and utilities:

          • OpenStack Swift
          • OpenStack Trove
          • OpenStack Zaqar
          • CloudFoundry
          • OpenShift


          701.3 Source Code Management

          Description: Candidates should be able to use Git to manage and share source code. This includes creating and contributing to a repository as well as the usage of tags, branches and remote repositories. Furthermore, the candidate should be able to merge files and resolve merging conflicts.


          Key Knowledge Areas:

          • Understand Git concepts and repository structure
          • Manage files within a Git repository
          • Manage branches and tags
          • Work with remote repositories and branches as well as submodules
          • Merge files and branches
          • Awareness of SVN and CVS, including concepts of centralized and distributed SCM solutions

          The following is a partial list of the used files, terms and utilities:

          • git
          • .gitignore


          701.4 Continuous Integration and Continuous Delivery

          Description: Candidates should understand the principles and components of a continuous integration and continuous delivery pipeline. Candidates should be able to implement a CI/CD pipeline using Jenkins, including triggering the CI/CD pipeline, running unit, integration and acceptance tests, packaging software and handling the deployment of tested software artifacts. This objective covers the feature set of Jenkins version 2.0 or later.


          Key Knowledge Areas:

          • Understand the concepts of Continuous Integration and Continuous Delivery
          • Understand the components of a CI/CD pipeline, including builds, unit, integration and acceptance tests, artifact management, delivery and deployment
          • Understand deployment best practices
          • Understand the architecture and features of Jenkins, including Jenkins Plugins, Jenkins API, notifications and distributed builds
          • Define and run jobs in Jenkins, including parameter handling
          • Fingerprinting, artifacts and artifact repositories
          • Understand how Jenkins models continuous delivery pipelines and implement a declarative continuous delivery pipeline in Jenkins
          • Awareness of possible authentication and authorization models
          • Understanding of the Pipeline Plugin
          • Understand the features of important Jenkins modules such as Copy Artifact Plugin, Fingerprint Plugin, Docker Pipeline, Docker Build and Publish plugin, Git Plugin, Credentials Plugin
          • Awareness of Artifactory and Nexus

          The following is a partial list of the used files, terms and utilities:

          • Step, Node, Stage
          • Jenkins SDL
          • Jenkinsfile
          • Declarative Pipeline
          • Blue-green and canary deployment


          Topic 702: Container Management

          702.1 Container Usage

          Description: Candidates should be able to build, share and operate Docker containers. This includes creating Dockerfiles, using a Docker registry, creating and interacting with containers as well as connecting containers to networks and storage volumes. This objective covers the feature set of Docker version 17.06 or later.


          Key Knowledge Areas:

          • Understand the Docker architecture
          • Use existing Docker images from a Docker registry
          • Create Dockerfiles and build images from Dockerfiles
          • Upload images to a Docker registry
          • Operate and access Docker containers
          • Connect container to Docker networks
          • Use Docker volumes for shared and persistent container storage

          The following is a partial list of the used files, terms and utilities:

          • docker
          • Dockerfile
          • .dockerignore

           

          702.2 Container Deployment and Orchestration

          Description: Candidates should be able to run and manage multiple containers that work together to provide a service. This includes the orchestration of Docker containers using Docker Compose in conjunction with an existing Docker Swarm cluster as well as using an existing Kubernetes cluster. This objective covers the feature sets of Docker Compose version 1.14 or later, Docker Swarm included in Docker 17.06 or later and Kubernetes 1.6 or later.


          Key Knowledge Areas:

          • Understand the application model of Docker Compose
          • Create and run Docker Compose Files (version 3 or later)
          • Understand the architecture and functionality of Docker Swarm mode
          • Run containers in a Docker Swarm, including the definition of services, stacks and the usage of secrets
          • Understand the architecture and application model Kubernetes
          • Define and manage a container-based application for Kubernetes, including the definition of Deployments, Services, ReplicaSets and Pods


          The following is a partial list of the used files, terms and utilities:

          • docker-compose
          • docker
          • kubectl

           

          702.3 Container Infrastructure

          Description: Candidates should be able to set up a runtime environment for containers. This includes running containers on a local workstation as well as setting up a dedicated container host. Furthermore, candidates should be aware of other container infrastructures, storage, networking and container specific security aspects. This objective covers the feature set of Docker version 17.06 or later and Docker Machine 0.12 or later.


          Key Knowledge Areas:

          • Use Docker Machine to setup a Docker host
          • Understand Docker networking concepts, including overlay networks
          • Create and manage Docker networks
          • Understand Docker storage concepts
          • Create and manage Docker volumes
          • Awareness of Flocker and flannel
          • Understand the concepts of service discovery
          • Basic feature knowledge of CoreOS Container Linux, rkt and etcd
          • Understand security risks of container virtualization and container images and how to mitigate them


          The following is a partial list of the used files, terms and utilities:

          • docker-machine


          Topic 703: Machine Deployment

          703.1 Virtual Machine Deployment

          Description: Candidates should be able to automate the deployment of a virtual machine with an operating system and a specific set of configuration files and software.


          Key Knowledge Areas:

          • Understand Vagrant architecture and concepts, including storage and networking
          • Retrieve and use boxes from Atlas
          • Create and run Vagrantfiles
          • Access Vagrant virtual machines
          • Share and synchronize folder between a Vagrant virtual machine and the host system
          • Understand Vagrant provisioning, including File, Shell, Ansible and Docker
          • Understand multi-machine setup


          The following is a partial list of the used files, terms and utilities:

          • vagrant
          • Vagrantfile

           

          703.2 Cloud Deployment

          Description: Candidates should be able to configure IaaS cloud instances and adjust them to match their available hardware resources, specifically, disk space and volumes. Additinally, candidates should be able to configure instances to allow secure SSH logins and prepare the instances to be ready for a configuration management tool such as Ansible.


          Key Knowledge Areas:

          • Understanding the features and concepts of cloud-init, including user-data and initializing and configuring cloud-init
          • Use cloud-init to create, resize and mount file systems, configure user accounts, including login credentials such as SSH keys and install software packages from the distribution’s repository
          • Understand the features and implications of IaaS clouds and virtualization for a computing instance, such as snapshotting, pausing, cloning and resource limits.

           

          703.3 System Image Creation

          Description: Candidates should be able to create images for containers, virtual machines and IaaS cloud instances.


          Key Knowledge Areas:

          • Understand the functionality and features of Packer
          • Create and maintain template files
          • Build images from template files using different builders


          The following is a partial list of the used files, terms and utilities:

          • packer


          Topic 704: Configuration Management

          704.1 Ansible

          Description: Candidates should be able to use Ansible to ensure a target server is in a specific state regarding its configuration and installed software. This objective covers the feature set of Ansible version 2.2 or later.


          Key Knowledge Areas:

          • Understand the principles of automated system configuration and software installation
          • Create and maintain inventory files
          • Understand how Ansible interacts with remote systems
          • Manage SSH login credentials for Ansible, including using unprivileged login accounts
          • Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers
          • Set and use variables
          • Maintain secrets using Ansible vaults
          • Write Jinja2 templates, including using common filters, loops and conditionals
          • Understand and use Ansible roles and install Ansible roles from Ansible Galaxy
          • Understand and use important Ansible tasks, including file, copy, template, ini_file, lineinfile, patch, replace, user, group, command, shell, service, systemd, cron, apt, debconf, yum, git, and debug
          • Awareness of dynamic inventory
          • Awareness of Ansibles features for non-Linux systems
          • Awareness of Ansible containers


          The following is a partial list of the used files, terms and utilities:

          • ansible.cfg
          • ansible-playbook
          • ansible-vault
          • ansible-galaxy
          • ansible-doc

           

          704.2 Other Configuration Management Tools

          Description: Candidates should understand the main features and principles of important configuration management tools other than Ansible.


          Key Knowledge Areas:

          • Basic feature and architecture knowledge of Puppet.
          • Basic feature and architecture knowledge of Chef.


          The following is a partial list of the used files, terms and utilities:

          • Manifest, Class, Recipe, Cookbook
          • puppet
          • chef
          • chef-solo
          • chef-client
          • chef-server-ctl
          • knife


          Topic 705: Service Operations

          705.1 IT Operations and Monitoring

          Description: Candidates should understand how IT infrastructure is involved in delivering a service. This includes knowledge about the major goals of IT operations, understanding functional and nonfunctional properties of an IT services and ways to monitor and measure them using Prometheus. Furthermore candidates should understand major security risks in IT infrastructure. This objective covers the feature set of Prometheus 1.7 or later.


          Key Knowledge Areas:

          • Understand goals of IT operations and service provisioning, including nonfunctional properties such as availability, latency, responsiveness
          • Understand and identify metrics and indicators to monitor and measure the technical functionality of a service
          • Understand and identify metrics and indicators to monitor and measure the logical functionality of a service
          • Understand the architecture of Prometheus, including Exporters, Pushgateway, Alertmanager and Grafana
          • Monitor containers and microservices using Prometheus
          • Understand the principles of IT attacks against IT infrastructure
          • Understand the principles of the most important ways to protect IT infrastructure
          • Understand core IT infrastructure components and their the role in deployment


          The following is a partial list of the used files, terms and utilities:

          • Prometheus, Node exporter, Pushgateway, Altermanager, Grafana
          • Service exploits, brute force attacks, and denial of service attacks
          • Security updates, packet filtering and application gateways
          • Virtualization hosts, DNS and load balancers

           

          705.2 Log Management and Analysis

          Description: Candidates should understand the role of log files in operations and troubleshooting. They should be able to set up centralized logging infrastructure based on Logstash to collect and normalize log data. Furthermore, candidates should understand how Elasticsearch and Kibana help to store and access log data.


          Key Knowledge Areas:

          • Understand how application and system logging works
          • Understand the architecture and functionality of Logstash, including the lifecycle of a log message and Logstash plugins
          • Understand the architecture and functionality of Elasticsearch and Kibana in the context of log data management (Elastic Stack)
          • Configure Logstash to collect, normalize, transform and store log data
          • Configure syslog and Filebeat to send log data to Logstash
          • Configure Logstash to send email alerts
          • Understand application support for log management


          The following is a partial list of the used files, terms and utilities:

          • logstash
          • input, filter, output
          • grok filter
          • Log files, metrics
          • syslog.conf
          • /etc/logstash/logstash.yml
          • /etc/filebeat/filebeat.yml

          Интензивен Онлайн Курс Cisco CCNA Routing and Switching 100-105 ICND1 Interconnecting Cisco Networking Devices Part 1 версия 3.0


          IT-Training Ви гарантира 100% за качеството на този курс. Ако по някаква причина обучението не отговори на очакванията ви, ние ви гарантираме възстановяване на сумата, която сте заплатили.

          Официален Cisco курс - Курсът е съгласно програмата на Cisco Systems и основната му цел е подготовка за сертифициране за CCNA Routing and Switching, както и за повишаване на професионалните умения и квалификация.

          Формат на курса: ИНТЕНЗИВЕН ОНЛАЙН курс (провежда се в интензивна форма на обучение - в няколко поредни дни от седмицата, обикновенно започва в понеделник и приключва в петък, провежда се в интервалите от 09:00 до 17:00 (възможни са и други дни и часове на провеждане), воден от инструктор, виртуална класна стая

          Език на курса: български (английски е наличен като опция).

          Метериали: в електронен формат, включени в цената.

          Пакет от услуги включени към курса:

          • онлайн обучение
          • сертификат за завършен курс
          • достъп до виртуален лаб
          • книги и учебни материали
          • видео библиотека към курса - достъп до видео записи на сесиите към курса

          Курсът е подходящ за: начинаещи в мрежовите технологии или мрежовата администрация; желаещи да се сертифицират за CCNA Routing and Switching; желаещи да научат мрежови технологии базирани на Cisco Systems продуки и устройства и да повишат професионалната си квалификация.

          Интерактивен формат: участниците имат възможност да участват в дискусии, да задават въпроси, двупосочна връзка с интруктора в реално време, чрез виртуалната класна стая. Онлайн формата се провежда в реално време по график, участниците са свързани наживо, за разлика от видео курсовете при онлайн формата не се презентира видео запис.

          График: изберете удобен за вас график от падащото меню.  Курсът се провежда в удобно и съобразено с участниците време.

          Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

          Примерни тестове: позволяват да проверите подготовката си за  сертификационен изпит с примерни въпроси.

          Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

          Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

          Сертификат: всички участници получават сертификат за завършен курс.

          При отказ от достъп до лаб среда се предоставя отстъпка.

          Метод на плащане: PayPal, банков превод, наложен платеж, брой.

          Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.


          Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

          След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

          Ако имате въпроси можете да се свържете с нас, чрез меню контакти.


          Предпоставки

          • Преди да вземат участие в ICND1, участниците трябва да разполагат с:
          • Начална компютърна грамотност и умения за работа в Интернет
          • Основни умения свързани с компютърните операционни системи
          • Основни познания за IP адресите


          Описание на курса

          Настоящият курс ще предостави на студентите познания по QoS (Качество на услугите), виртуализация и облачни услуги, мрежова програмируемост свързана с WAN, access и core сегментите на мрежата.Ще предостави основно разбиране на мрежовите слоеве 1-3, които са отговорни за ядрото на routing и switching както и други напреднали технологии. Добавени са няколко нови теми, като, разирането на работата на защитните стени (firewalls), безжични контролери (wireless controllers) и точките за достъпп (access points), както и допълнителни теми фокусирани върху IPv6 и основите на мрежовата сигурност. Конфигурационните команди са представени, чре примери и практически примерни задачи в лабораторните упражнения. За курса е изграден изцяло нов пълноценен лаб, чрез виртуална IOS среда с гъвкави топологии, които приповтарят теоретичните концепции с практически упражнения, тясно обвързани с всеки отделен урок на курса. След завършване на настоящия курс, обучаемите ще могат да прилагат следните умения:

          • Описват мрежовите основи и изграждат малка локална мрежа
          • Осъществяват мрежова свързаност с интернет
          • Управляват сигурността на мрежовите устройства
          • Надграждат малки и средно големи мрежи с WAN свързаност
          • Описват основите на IPv6


          Съдържание на курса

          Module 1: Изграждане на малка мрежа

          Module 2: Изграждане на Internet свързаност

          Module 3: Практически модул с задача

          Module 4: Изграждане на средна по големина мрежа

          Module 5: Управление на мрежови устройства и сигурност

          Module 6: Практически модул с задача

          Module 7: Въведение в IPv6



          Introduction

          The AWS Certified SysOps Administrator – Associate Level exam validates a candidate’s ability to:

           Deliver the stability and scalability needed by a business on AWS

           Provision systems, services and deployment automation on AWS

           Ensure data integrity and data security on AWS technology

           Provide guidance on AWS best practices

           Understand and monitor metrics on AWS

          The basic knowledge and skills required at this level should include all of the following areas and objective

          components below.

          AWS Knowledge

           Minimum of one year hands-on experience with the AWS platform

           Professional experience managing/operating production systems on AWS

           A firm grasp of the seven AWS tenets – architecting for the cloud

           Hands on experience with the AWS CLI and SDKs/API tools

           Understanding of network technologies as they relate to AWS

           Good grasp of fundamental Security concepts with hands on in experience in implementing Security

          controls and compliance requirements

          General IT Knowledge

           1-2 years’ experience as a systems administrator in a systems operations role

           Experience understanding virtualization technology

           Monitoring and auditing systems experience

           Knowledge of networking concepts (DNS, TCP/IP, and Firewalls)

           Ability to collaborate with developers and the general business team/company wide

          These training courses or other equivalent methodologies will assist in exam preparation:

           SysOps on AWS (aws.amazon.com/training/sysops)

           AWS Cloud Computing Whitepapers (aws.amazon.com/whitepapers)

          o Overview of Security Processes

          o Storage Options in the Cloud

          o Defining Fault Tolerant Applications in the AWS Cloud

          o Overview of Amazon Web Services

          o Compliance Whitepaper

          o Architecting for the AWS Cloud

           AWS Documentation (aws.amazon.com/documentation)

          Note: This examination blueprint includes weighting, test objectives, and example content. Example topics and

          concepts are included to clarify the test objectives. They should not be construed as a comprehensive listing of

          all of the content of this examination.

          The table below lists the domains measured by this examination and the extent to which they are represented.

          Domain % of Examination

          1.0 Monitoring and Metrics 15%

          2.0 High Availability 15%

          3.0 Analysis 15%

          4.0 Deployment and Provisioning 15%

          5.0 Data Management 12%

          6.0 Security 15%

          7.0 Networking 13%

          TOTAL 100%

          AWS Certified SysOps Administrator - Associate Level

          Exam Blueprint

          2

          Response Limits

          The examinee selects from four (4) or more response options the option(s) that best completes the statement or

          answers the question. Distracters or wrong answers are response options that examinees with incomplete

          knowledge or skill would likely choose, but are generally plausible responses fitting into the content area defined

          by the test objective.

          Test item formats used in this examination are:

           Multiple-choice: examinee selects one option that best answers the question or completes a statement.

          The option can be embedded in a graphic where the examinee “points and clicks” on their selection

          choice to complete the test item.

           Multiple-response: examinee selects more than one option that best answers the question or completes

          a statement.

           Sample Directions: Read the statement or question and from the response options, select only the

          option(s) that represent the most correct or best answer(s) given the information.

          Content Limits

          1 Domain 1.0: Monitoring and Metrics

          1.1 Demonstrate ability to monitor availability and performance

          1.2 Demonstrate ability to monitor and manage billing and cost optimization processes

          2 Domain 2.0: High Availability

          2.1 Implement scalability and elasticity based on scenario

          2.2 Ensure level of fault tolerance based on business needs

          3 Domain 3.0: Analysis

          3.1 Optimize the environment to ensure maximum performance

          3.2 Identify performance bottlenecks and implement remedies

          3.3 Identify potential issues on a given application deployment

          4 Domain 4.0: Deployment and Provisioning

          4.1 Demonstrate the ability to build the environment to conform with the architected design

          4.2 Demonstrate the ability to provision cloud resources and manage implementation automation

          5 Domain 5.0: Data Management

          5.1 Demonstrate ability to create backups for different services

          5.2 Demonstrate ability to enforce compliance requirements

          5.3 Manage backup and disaster recovery processes

          6 Domain 6.0: Security

          6.1 Implement and manage security policies

          6.2 Ensure data integrity and access controls when using the AWS platform

          6.3 Demonstrate understanding of the shared responsibility model

          6.4 Demonstrate ability to prepare for security assessment use of AWS

          7 Domain 7.0: Networking

          7.1 Demonstrate ability to implement networking features of AWS

          7.2 Demonstrate ability to implement connectivity features of AWS 


          Онлайн Курс LPI LPIC-2 201 (201-450) Linux Engineer

          IT-Training Ви гарантира 100% за качеството на този курс. Ако по някаква причина обучението не отговори на очакванията ви, ние ви гарантираме възстановяване на сумата, която сте заплатили.

          IT-Training.pro е Authorized Training Partner на Linux Professional Institute. Всички LPIC курсове са съгласно официалната сертификационна програма с гарантирано качество и успеваемост. 

          Формат на курса: Онлайн, провежда се в реално време от сертифициран инструктор във виртуална класна стая. Курсът е част от сертификационната програма на Linux Professional Institute и служи за подготовка за сертифициране за ниво LPIC-2, както и за професионално развитие като Linux System Administrator и Linux IT специалист.

          Език на курса: български (английски е наличен като опция).

          Метериали: в електронен формат, включени в цената.

          Пакет от услуги включени към курса:

          • онлайн обучение
          • сертификат за завършен курс
          • достъп до виртуален лаб
          • книги и учебни материали
          • достъп до онлайн примерни тестове
          • видео библиотека към курса - достъп до видео записи на сесиите към курса

          Курсът е подходящ за: Linux администратори; желаещи да се сертифицират за LPIC-2; желаещи да научат Linux и да повишат професионалната си квалификация.

          Интерактивен формат: участниците имат възможност да участват в дискусии, да задават въпроси, двупосочна връзка с интруктора в реално време, чрез виртуалната класна стая. Онлайн формата се провежда в реално време по график, участниците са свързани наживо, за разлика от видео курсовете при онлайн формата не се презентира видео запис.

          График: изберете удобен за вас график от падащото меню.  Курсът се провежда в удобно и съобразено с участниците време.

          Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

          Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

          Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

          Сертификат: всички участници получават сертификат за завършен курс.

          Метод на плащане: PayPal, банков превод, наложен платеж, брой, плащане с карта (Maestro, Mastercard, Visa).

          Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.


          Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

          След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

          Ако имате въпроси можете да се свържете с нас, чрез меню контакти.


          Съдържание:

          Topic 200: Capacity Planning
          200.1 Measure and Troubleshoot Resource Usage
          Description: Candidates should be able to measure hardware resource and network bandwidth, identify and troubleshoot resource problems.
          Key Knowledge Areas:
          Measure CPU usage
          Measure memory usage
          Measure disk I/O
          Measure network I/O
          Measure firewalling and routing throughput
          Map client bandwidth usage
          Match / correlate system symptoms with likely problems
          Estimate throughput and identify bottlenecks in a system including networking
          The following is a partial list of the used files, terms and utilities:
          iostat, netstat, w, top, sar, processes blocked on I/O, blocks out, vmstat, pstree, ps, Isof, uptime, swap, blocks in

          200.2 Predict Future Resource Needs
          Description: Candidates should be able to monitor resource usage to predict future resource needs.
          Key Knowledge Areas:
          Use collectd to monitor IT infrastructure usage
          Predict capacity break point of a configuration
          Observe growth rate of capacity usage
          Graph the trend of capacity usage
          Awareness of monitoring solutions such as Nagios, MRTG and Cacti
          The following is a partial list of the used files, terms and utilities:
          diagnose
          predict growth
          resource exhaustion

          Topic 201: Linux Kernel
          201.1 Kernel Components
          Description: Candidates should be able to utilize kernel components that are necessary to specific hardware, hardware drivers, system resources and requirements. This objective includes implementing different types of kernel images, identifying stable and development kernels and patches, as well as using kernel modules.
          Key Knowledge Areas:
          Kernel 2.6.x, 3.x and 4.x documentation
          Terms and Utilities:
          /usr/src/linux/
          /usr/src/linux/Documentation/
          zImage
          bzImage
          xz compression

          201.2 Compiling a kernel
          Description: Candidates should be able to properly configure a kernel to include or disable specific features of the Linux kernel as necessary. This objective includes compiling and recompiling the Linux kernel as needed, updating and noting changes in a new kernel, creating an initrd image and installing new kernels.
          Key Knowledge Areas:
          /usr/src/linux/
          Kernel Makefiles
          Kernel 2.6.x/3.x make targets
          Customize the current kernel configuration.
          Build a new kernel and appropriate kernel modules.
          Install a new kernel and any modules.
          Ensure that the boot manager can locate the new kernel and associated files.
          Module configuration files
          Use DKMS to compile kernel modules.
          Awareness of dracut
          Terms and Utilities:
          mkinitrd, mkinitramfs, make
          make targets (all, config, xconfig, menuconfig, gconfig, oldconfig, mrproper, zImage, bzImage, modules, modules_install, rpm-pkg, binrpm-pkg, deb-pkg)
          gzip, bzip2, module tools, /usr/src/linux/.config, /lib/modules/kernel-version/, depmod, dkms

          201.3 Kernel runtime management and troubleshooting
          Description: Candidates should be able to manage and/or query a 2.6.x, 3.x or 4.x kernel and its loadable modules. Candidates should be able to identify and correct common boot and run time issues. Candidates should understand device detection and management using udev. This objective includes troubleshooting udev rules.
          Key Knowledge Areas:
          Use command-line utilities to get information about the currently running kernel and kernel modules
          Manually load and unload kernel modules
          Determine when modules can be unloaded
          Determine what parameters a module accepts
          Configure the system to load modules by names other than their file name.
          /proc filesystem
          Content of /, /boot/ , and /lib/modules/
          Tools and utilities to analyze information about the available hardware
          udev rules
          Terms and Utilities:
          /lib/modules/kernel-version/modules.dep, module configuration files in /etc/, /proc/sys/kernel/, /sbin/depmod, /sbin/rmmod, /sbin/modinfo, /bin/dmesg, /sbin/lspci, /usr/bin/lsdev, /sbin/lsmod, /sbin/modprobe, /sbin/insmod, /bin/uname, /usr/bin/lsusb, /etc/sysctl.conf, /etc/sysctl.d/, /sbin/sysctl, udevmonitor, udevadm monitor, /etc/udev/

          Topic 202: System Startup
          202.1 Customizing SysV-init system startup
          Description: Candidates should be able to query and modify the behaviour of system services at various run levels. A thorough understanding of the init structure and boot process is required. This objective includes interacting with run levels.
          Key Knowledge Areas:
          Linux Standard Base Specification (LSB)
          SysV init environment
          Terms and Utilities:
          /etc/inittab, /etc/init.d/, /etc/rc.d/, chkconfig, update-rc.d, init and telinit

          202.2 System Recovery
          Description: Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options. Candidates should be able to determine the cause of errors in loading and usage of bootloaders. GRUB version 2 and GRUB Legacy are the bootloaders of interest.
          Key Knowledge Areas:
          GRUB version 2 and Legacy
          Grub shell
          Boot loader start and hand off to kernel
          Kernel loading
          Hardware initialization and setup
          Daemon/service initialization and setup
          Know the different boot loader install locations on a hard disk or removable device
          Overwriting standard boot loader options and using boot loader shells
          Awareness of UEFI
          Terms and Utilities:
          mount, fsck, inittab, telinit and init with SysV init, the contents of /boot/ and /boot/grub/, GRUB, grub-install, initrd, initramfs, aster boot record

          202.3 Alternate Bootloaders
          Description: Candidates should be aware of other bootloaders and their major features.
          Key Knowledge Areas:
          SYSLINUX, ISOLINUX, PXELINUX
          Understanding of PXE for both BIOS and UEFI
          Awareness of systemd-boot and U-Boot
          Terms and Utilities:
          syslinux
          extlinux
          isolinux.bin
          isolinux.cfg
          isohdpfx.bin
          efiboot.img
          pxelinux.0
          pxelinux.cfg/
          uefi/shim.efi
          uefi/grubx64.efi

          Topic 203: Filesystem and Devices
          203.1 Operating the Linux filesystem
          Description: Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types.
          Key Knowledge Areas:
          The concept of the fstab configuration
          Tools and utilities for handling SWAP partitions and files
          Use of UUIDs for identifying and mounting file systems
          Terms and Utilities:
          /etc/fstab
          /etc/mtab
          /proc/mounts
          mount and umount
          blkid
          sync
          swapon
          swapoff

          203.2 Maintaining a Linux filesystem​
          Description: Candidates should be able to properly maintain a Linux filesystem using system utilities. This objective includes manipulating standard filesystems and monitoring SMART devices.
          Key Knowledge Areas:
          Tools and utilities to manipulate and ext2, ext3 and ext4
          Tools and utilities to manipulate xfs
          Awareness of Btrfs
          Terms and Utilities:
          fsck (fsck.*)
          mkfs (mkfs.*)
          dumpe2fs, xfsdump, xfsrestore
          debugfs
          tune2fs
          mkswap
          xfs_info, xfs_check and xfs_repair
          smartd, smartctl

          203.3 Creating and configuring filesystem options
          Description: Candidates should be able to configure automount filesystems using AutoFS. This objective includes configuring automount for network and device filesystems. Also included is creating filesystems for devices such as CD-ROMs and a basic feature knowledge of encrypted filesystems.
          Key Knowledge Areas:
          autofs configuration files
          UDF and ISO9660 tools and utilities
          awareness of CD-ROM filesystems (UDF, ISO9660, HFS)
          awareness of CD-ROM filesystem extensions (Joliet, Rock Ridge, El Torito)
          basic feature knowledge of encrypted filesystems
          Terms and Utilities:
          /etc/auto.master
          /etc/auto.[dir]
          mkisofs

          Topic 204: Advanced Storage Device Administration
          204.1 Configuring RAID
          Description: Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.
          Key Knowledge Areas:
          Software raid configuration files and utilities
          Terms and Utilities:
          mdadm.conf
          mdadm
          /proc/mdstat
          partition type 0xFD

          204.2 Adjusting Storage Device Access
          Description: Candidates should be able to configure kernel options to support various drives. This objective includes software tools to view & modify hard disk settings including iSCSI devices.
          Key Knowledge Areas:
          Tools and utilities to configure DMA for IDE devices including ATAPI and SATA
          Tools and utilities to manipulate or analyze system resources (e.g. interrupts)
          Awareness of sdparm command and its uses
          Tools and utilities for iSCSI
          Terms and Utilities:
          hdparm, sdparm
          tune2fs
          sysctl
          /dev/hd*, /dev/sd*
          iscsiadm, scsi_id, iscsid and iscsid.conf
          WWID, WWN, LUN numbers

          204.3 Logical Volume Manager
          Description: Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.
          Key Knowledge Areas:
          Tools in the LVM suite
          Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes
          Creating and maintaining snapshots
          Activating volume groups
          Terms and Utilities:
          /sbin/pv*
          /sbin/lv*
          /sbin/vg*
          mount
          /dev/mapper/

          Topic 205: Network Configuration
          205.1 Basic networking configuration
          Description: Candidates should be able to configure a network device to be able to connect to a local, wired or wireless, and a wide-area network. This objective includes being able to communicate between various subnets within a single network including both IPv4 and IPv6 networks.
          Key Knowledge Areas:
          Utilities to configure and manipulate ethernet network interfaces
          Configuring basic access to wireless networks with iw, iwconfig and iwlist
          Terms and Utilities:
          /sbin/route
          /sbin/ifconfig
          /sbin/ip
          /usr/sbin/arp
          /sbin/iwconfig
          /sbin/iwlist

          205.2 Advanced Network Configuration and Troubleshooting
          Description: Candidates should be able to configure a network device to implement various network authentication schemes. This objective includes configuring a multi-homed network device and resolving communication problems.
          Key Knowledge Areas:
          Utilities to manipulate routing tables
          Utilities to configure and manipulate ethernet network interfaces
          Utilities to analyze the status of the network devices
          Utilities to monitor and analyze the TCP/IP traffic
          Terms and Utilities:
          /sbin/route
          /sbin/ifconfig
          /bin/netstat
          /bin/ping
          /usr/sbin/arp
          /usr/sbin/tcpdump
          /usr/sbin/lsof
          /usr/bin/nc
          /sbin/ip
          nmap

          205.3 Troubleshooting Network Issues
          Description: Candidates should be able to identify and correct common network setup issues, to include knowledge of locations for basic configuration files and commands.
          Key Knowledge Areas:
          Location and content of access restriction files
          Utilities to configure and manipulate ethernet network interfaces
          Utilities to manage routing tables
          Utilities to list network states.
          Utilities to gain information about the network configuration
          Methods of information about the recognized and used hardware devices
          System initialization files and their contents (SysV init process)
          Awareness of NetworkManager and its impact on network configuration
          Terms and Utilities:
          /sbin/ifconfig
          /sbin/route
          /bin/netstat
          /etc/network/, /etc/sysconfig/network-scripts/
          /bin/ping
          System log files such as /var/log/syslog & /var/log/messages
          /etc/resolv.conf
          /etc/hosts
          /etc/hostname, /etc/HOSTNAME
          /bin/hostname
          /usr/sbin/traceroute
          /bin/dmesg
          /etc/hosts.allow, /etc/hosts.deny

          Topic 206: System Maintenance
          206.1 Make and install programs from source
          Description: Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.
          Key Knowledge Areas:
          Unpack source code using common compression and archive utilities
          Understand basics of invoking make to compile programs
          Apply parameters to a configure script
          Know where sources are stored by default
          Terms and Utilities:
          /usr/src/
          gunzip
          gzip
          bzip2
          tar
          configure
          make
          uname
          install
          patch

          206.2 Backup operations
          Description: Candidates should be able to use system tools to back up important system data.
          Key Knowledge Areas:
          Knowledge about directories that have to be include in backups
          Awareness of network backup solutions such as Amanda, Bacula and BackupPC
          Knowledge of the benefits and drawbacks of tapes, CDR, disk or other backup media
          Perform partial and manual backups
          Verify the integrity of backup files
          Partially or fully restore backups
          Terms and Utilities:
          /bin/sh
          dd
          tar
          /dev/st* and /dev/nst*
          mt
          rsync

          206.3 Notify users on system-related issues
          Description: Candidates should be able to notify the users about current issues related to the system.
          Key Knowledge Areas:
          Automate communication with users through logon messages
          Inform active users of system maintenance
          Terms and Utilities:
          /etc/issue
          /etc/issue.net
          /etc/motd
          wall
          /sbin/shutdown

          Онлайн Курс Juniper Networks Enterprise Routing and Switching Professional JNCIP-ENT JN0-647-1


          IT-Training Ви гарантира 100% за качеството на този курс. Ако по някаква причина обучението не отговори на очакванията ви, ние ви гарантираме възстановяване на сумата, която сте заплатили.

          Формат на курса: Онлайн, провежда се в реално време от инструктор във виртуална класна стая.

          Език на курса: български (английски е наличен като опция).

          Метериали: в електронен формат, включени в цената.

          Пакет от услуги включени към курса:

          • онлайн обучение
          • сертификат за завършен курс
          • достъп до виртуален лаб
          • книги и учебни материали
          • достъп до онлайн тестове
          • видео библиотека към курса - достъп до видео записи на сесиите към курса

          Курсът е подходящ за: начинаещи Juniper или мрежови администратори; желаещи да се сертифицират за Juniper Networks JNCIP; желаещи да научат Juniper JUNOS и да повишат професионалната си квалификация.

          Интерактивен формат: участниците имат възможност да участват в дискусии, да задават въпроси, двупосочна връзка с интруктора в реално време, чрез виртуалната класна стая. Онлайн формата се провежда в реално време по график, участниците са свързани наживо, за разлика от видео курсовете при онлайн формата не се презентира видео запис.

          График: изберете удобен за вас график от падащото меню.  Курсът се провежда в удобно и съобразено с участниците време.

          Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

          Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

          Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

          Сертификат: всички участници получават сертификат за завършен курс.

          Метод на плащане: PayPal, банков превод, наложен платеж, брой.

          Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.


          Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

          След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

          Ако имате въпроси можете да се свържете с нас, чрез меню контакти.


          Курсът е проектиран за опитни мрежови професионалисти с напреднало познание на Junos OS на Juniper Networks. Писменият изпит проверява разбирането на кандидата за advanced enterprise routing and switching technologies и свързаните умения за конфигурация на устройствата и отстраняване на неизправности.


          Сертификатът е валиден за срок от три години. Ресертификация се постига чрез преминаване на JN0-647 изпит или сертифициране за друга сертификационна пътека.


          Курсът и включва следните изпитни теми:

          Advanced Junos Enterprise Routing (AJER)

            • OSPF
            • BGP
            • IP Multicast
            • Class of Service (CoS)

            Course Format: online instructor lead training in a virtual class room

            Language: Bulgarian (English optional)

            Course Files: digital format, price included in the course

            Lab environment: individual lab env. for each student.

            Course Duration40 learning hours online training (theory and practice).


            If lab access is not required by student, the price will be deduct. 

            Payment Method: PayPal, bank transfer, cash payments, wire transfer


            Invoice can be requested with a support request using our contacts page.

            The Invoice is issued normally in 7 days after the payment has been confirmed. 

            Additional information can be found using our contacts page.


            Training Dates: please check the IT Training Calendar in the main site. 

            We will contact you to confirm the dates and registration. 


            At course completion

            After completing this course, students will be able to:

            Secure Windows Server.

            Secure application development and a server workload infrastructure.

            Manage security baselines.

            Configure and manage just enough and just-in-time (JIT) administration.

            Manage data security.

            Configure Windows Firewall and a software-defined distributed firewall.

            Secure network traffic.

            Secure your virtualization infrastructure.

            Manage malware and threats.

            Configure advanced auditing.

            Manage software updates.

            Manage threats by using Advanced Threat Analytics (ATA) and Microsoft Operations Management Suite (OMS).


            Course Outline

            Module 1: Breach detection and using the Sysinternals tools

            In this module, students will learn about breach detection, attack types and vectors, cybercrime, and how you can analyse your system’s activity by using the Sysinternals tool suite.

            Lessons

            Overview of breach detection

            Using the Sysinternals tools to detect breaches

            Lab : Basic breach detection and incident response strategies

            Identifying attack types

            Using incident-response strategies

            Exploring the Sysinternals tools

            After completing this course, students will be able to:

            Describe breach detection.

            Describe how to detect a breach by using the Sysinternals tools.

            Module 2: Protecting credentials and privileged access

            This module explains how you can configure user rights and security options, protect credentials by using credential guard, implement privileged-access workstations, and manage and deploy a local administrator-password solution so that you can manage passwords for local administrator accounts.

            Lessons

            Understanding user rights

            Computer and service accounts

            Protecting credentials

            Understanding privileged-access workstations and jump servers

            Deploying a local administrator-password solution

            Lab : User rights, security options, and group-managed service accounts

            Configuring security options

            Configuring restricted groups

            Delegating privileges

            Creating and managing group managed service accounts (MSAs)

            Configuring the Credential Guard feature

            Locating problematic accounts

            Lab : Configuring and deploying LAPs

            Installing local administrator password solution (LAPs)

            Configuring LAPs

            Deploying LAPs

            After completing this module, students will be able to:

            Understand user rights.

            Describe computer and service accounts.

            Help protect credentials.

            Understand privileged-access workstations and jump servers.

            Understand how to use a local administrator-password solution.

            Module 3: Limiting administrator rights with Just Enough Administration

            This module explains how to deploy and configure Just Enough Administration (JEA).

            Lessons

            Understanding JEA

            Configuring and deploying JEA

            Lab : Limiting administrator privileges by using JEA

            Creating a role-capability file

            Creating a session-configuration file

            Creating a JEA endpoint

            Connecting to a JEA endpoint

            Deploying JEA by using Desire State Configuration (DSC)

            After completing this module, students will be able to:

            Understand JEA.

            Configure and deploy JEA.

            Module 4: Privileged Access Management and administrative forests

            This module explains the concepts of Enhanced Security Administrative Environment (ESAE) forests, Microsoft Identity Manager (MIM), and Just In Time (JIT) Administration, or Privileged Access Management.

            Lessons

            Understanding ESAE forests

            Overview of MIM

            Implementing JIT and Privileged Access Management by using MIM

            Lab : Limiting administrator privileges by using Privileged Access Management

            Using a layered approach to security

            Exploring MIM

            Configuring a MIM web portal

            Configuring the Privileged Access feature

            Requesting privileged access

            After completing this module, students will be able to:

            Understand enhanced security administrative environment forests.

            Understand MIM.

            Understand how to implement JIT and Privileged Access Management by using MIM.

            Module 5: Mitigating malware and threats

            This module explains how to configure the Windows Defender, AppLocker, and Device Guard features.

            Lessons

            Configuring and managing Windows Defender

            Using software restricting policies (SRPs) and AppLocker

            Configuring and using Device Guard

            Using and deploying the Enhanced Mitigation Experience Toolkit

            Lab : Securing applications by using AppLocker, Windows Defender, Device Guard Rules, and the EMET.

            Configuring Windows Defender

            Configuring AppLocker

            Configuring and deploying Device Guard

            Deploying and using EMET

            After completing this module, students will be able to:

            Configure and manage Windows Defender.

            Use Software Restricting Policies and AppLocker.

            Configure and use Device Guard.

            Use and deploy the EMET.

            Module 6: Analysing activity by using advanced auditing and log analytics

            This module explains how to use advanced auditing and Windows PowerShell transcripts.

            Lessons

            Overview of auditing

            Understanding advanced auditing

            Configuring Windows PowerShell auditing and logging

            Lab : Configuring encryption and advanced auditing

            Configuring auditing of file-system access

            Auditing domain logons

            Managing the configuration of advanced audit policies

            Windows PowerShell logging and auditing

            After completing this module, students will be able to:

            Understanding auditing.

            Understand advanced auditing.

            Audit and log Windows PowerShell.

            Module 7: Analysing activity with Microsoft Advanced Threat Analytics feature and Operations Management Suite

            This module explains the Microsoft Advanced Threat Analytics tool and the Microsoft Operations Management suite (OMS), and details how you can use them to monitor and analyse the security of a Windows Server deployment.

            Lessons

            Overview of Advanced Threat Analytics

            Understanding OMS

            Lab : Advanced Threat Analytics and Operations Management Suite

            Using ATA and OMS

            Preparing and deploying ATA

            Preparing and deploying OMS

            After completing this module, students will be able to:

            Understand Advanced Threat Analytics.

            Understand OMS.

            Module 8: Securing your virtualization an infrastructure

            This module explains how to configure Guarded Fabric virtual machines (VMs), including the requirements for shielded and encryption-supported VMs.

            Lessons

            Overview of Guarded Fabric VMs

            Understanding shielded and encryption-supported VMs

            Lab : Deploying and using Guarded Fabric with administrator-trusted attestation and shielded VMs

            Deploying Guarded Fabric VMs with administrator-trusted attestation

            Deploying a shielded VM

            After completing this module, students will be able to:

            Understand Guarded Fabric VMs.

            Understand shielded and encryption-supported VMs.

            Module 9: Securing application development and server-workload infrastructure

            This module details the Security Compliance Manager, including how you can use it to configure, manage, and deploy baselines. Additionally, students will learn how to deploy and configure Nano Server, Microsoft Hyper-V, and Windows Server Containers.

            Lessons

            Using Security Compliance Manager

            Introduction to Nano Server

            Understanding containers

            Lab : Using Security Compliance Manager

            Configuring a security baseline for Windows Server 2016

            Deploying a security baseline for Windows Server 2016

            Lab : Deploying and Configuring Nano Server and containers

            Deploying, managing, and securing Nano Server

            Deploying, managing, and securing Windows Server containers

            Deploying, managing, and securing Hyper-V containers

            After completing this module, students will be able to:

            Understand Security Compliance Manager.

            Describe Nano Server.

            Understand containers.

            Module 10: Protecting data with encryption

            This module explains how to configure Encrypting File System (EFS) and BitLocker drive encryption to protect data at rest.

            Lessons

            Planning and implementing encryption

            Planning and implementing BitLocker

            Lab : Configuring EFS and BitLocker

            Encrypting and recovering access to encrypted files

            Using BitLocker to protect data

            After completing this module, students will be able to:

            Plan and implement encryption.

            Plan and implement BitLocker.


            Module 11: Limiting access to file and folders

            This module explains how to optimize file services by configuring File Server Resource Manager (FSRM) and Distributed File System (DFS). Students will learn how to protect a device’s data by using encryption or BitLocker. Students also will learn how to manage access to shared files by configuring Dynamic Access Control (DAC).

            Lessons

            Introduction to FSRM

            Implementing classification management and file-management tasks

            Understanding Dynamic Access Control (DAC)

            Lab : Configuring quotas and file screening

            Configuring FSRM quotas

            Configuring file screening

            Lab : Implementing DAC

            Preparing DAC

            Implementing DAC

            After completing this module, students will be able to:

            Understand FSRM.

            Implement classification management and file-management tasks.

            Understand DAC.

            Module 12: Using firewalls to control network traffic flow

            This module explains the firewalls that are present on Windows Server.

            Lessons

            Understanding Windows Firewall

            Software-defined distributed firewalls

            Lab : Windows Firewall with Advanced Security

            Creating and testing inbound rules

            Creating and testing outbound rules

            After completing this module, students will be able to:

            Describe Windows Firewall.

            Understand software-defined distributed firewalls.

            Module 13: Securing network traffic

            This module explains how to secure network traffic and how to use Microsoft Message Analyzer, Server Message Block (SMB) encryption, and Domain Name System Security Extensions (DNSSEC).

            Lessons

            Network-related security threats and connection-security rules

            Configuring advanced DNS settings

            Examining network traffic with Microsoft Message Analyzer

            Securing SMB traffic, and analysing SMB traffic

            Lab : Connection security rules and securing DNS

            Creating and testing connection security rules

            Configuring and testing DNSSEC

            Lab : Microsoft Message Analyzer and SMB encryption

            Using Microsoft Message Analyzer

            Configuring and verifying SMB encryption on SMB shares

            After completing this module, students will be able to:

            Understand network-related security threats and connection security rules.

            Configure advanced DNS settings.

            Examine network traffic with Microsoft Message Analyzer.

            Secure SMB traffic, and analyze SMB traffic.

            Module 14: Updating Windows Server

            This module explains how to use Windows Server Update Services (WSUS) to deploy updates to Windows Servers and clients.

            Lessons

            Overview of WSUS

            Deploying updates by using WSUS

            Lab : Implementing update management

            Implementing the WSUS server role

            Configuring update settings

            Approving and deploying an update by using WSUS

            Deploying Windows Defender definition updates by using WSUS

            After completing this module, students will be able to:

            Understand WSUS.

            Deploy updates with WSUS.


            Course Format: ONLINE BOOTCAMP instructor lead training in a virtual class room (the entire course is held in one week of training, usually starts on monday and ends on friday, from 09:00am to 05:00pm, but dates and time can be adjusted according to the client needs. 

            Benefits: preparation for the certification exam, new skills

            Language: Bulgarian (English optional)

            Course Files: digital format, price included in the course

            Lab environment: individual lab env. for each student.

            Course Duration40 learning hours online training (theory and practice).

            Included as part of the service:

            • Online training
            • Virtual LAB access
            • Study materials - books, ebooks
            • Online Tests

            If lab access is not required by student, the price will be deduct. 

            Additional Information about the training content can be found on our web site - http://www.it-training.pro The ONline Training Academy

            Payment Method: PayPal, bank transfer, cash payments, wire transfer


            Invoice can be requested with a support request using our contacts page.

            The Invoice is issued normally in 7 days after the payment has been confirmed. 

            Additional information can be found using our contacts page.


            Training Dates: please check the IT Training Calendar in the main site. 

            We will contact you to confirm the dates and registration. 


            Designed for experienced networking professionals with intermediate knowledge of the Juniper Networks Junos OS for SRX Series devices, this online training gives the candidate understanding of security technologies and related platform configuration and troubleshooting skills.


            The JNCIS-SEC certification is valid for three years. 


            Junos for Security Platforms (JSEC):

              • Junos Security Overview
              • Zones
              • Security Policies
              • NAT
              • IPsec VPNs
              • High Availability (HA) Clustering
              • Virtual SRX

              Junos Security Overview

              Identify concepts, general features, and functionality of Junos OS security

              Junos security architecture

              Branch vs. high-end platforms

              Major hardware components of SRX Series services gateways

              Packet flow

              Packet-based vs. session-based forwarding


              Zones

              Identify the concepts, benefits, or operation of zones

              Zone types

              Dependencies

              Host inbound packet behavior

              Screens

              Transit packet behavior

              Demonstrate knowledge of how to configure, monitor, or troubleshoot zones

              Zone configuration steps

              Hierarchy priority (Inheritance)

              Screens

              Monitoring and troubleshooting


              Security Policies

              Identify the concepts, benefits, or operation of security policies

              Policy types

              Policy components

              Policy ordering

              Host inbound traffic examination

              Transit traffic examination

              Scheduling

              Rematching

              ALGs

              Address books

              Junos Space Security Director policy management

              Applications

              Demonstrate knowledge of how to configure, monitor, or troubleshoot security policies

              Policies

              ALGs

              Address books

              Junos Space Security Director policy management

              Custom applications

              Monitoring and troubleshooting


              NAT

              Identify the concepts, benefits, or operation of NAT

              NAT types

              NAT/PAT processing

              DNS Doctoring

              Cone NAT

              IPv4 to IPv6

              Address persistence

              NAT with Junos Space Security Director

              NAT proxy ARP

              Demonstrate knowledge of how to configure, monitor, or troubleshoot NAT

              NAT configuration steps

              Monitoring and troubleshooting


              IPSec VPNs

              Identify the concepts, benefits, or operation of IPsec VPNs

              Secure VPN characteristics and components

              IPSec tunnel establishment

              IPSec traffic processing

              Group VPN

              ADVPN

              IPsec with Junos Space Security Director

              PKI

              Dynamic VPN

              Junos OS IPsec implementation options

              Demonstrate knowledge of how to configure, monitor, or troubleshoot IPsec VPNs

              IPSec VPN configuration steps

              Monitoring and troubleshooting


              High Availability (HA) Clustering

              Identify the concepts, benefits, or operation of HA

              HA features and characteristics

              Deployment requirements and considerations

              Chassis cluster characteristics and operation

              Cluster modes

              Cluster and node IDs

              Redundancy groups

              Cluster interfaces

              Real-time objects

              State synchronization

              Ethernet switching considerations

              IPSec considerations

              Manual failover

              Demonstrate knowledge of how to configure, monitor, or troubleshoot clustering

              Cluster preparation

              Cluster configuration steps

              Monitoring and troubleshooting


              Virtual SRX

              Identify concepts, general features or functionality of virtualized security using SRX

              Installation

              Clustering with vSRX

              Deployment scenarios

              Troubleshooting


              Онлайн Live Курс Linux Professional Institute LPIC-1 Course 102 System Administrator


              IT-Training Ви гарантира 100% за качеството на този курс. Ако по някаква причина обучението не отговори на очакванията ви, ние ви гарантираме възстановяване на сумата, която сте заплатили.

              Формат на курса: Онлайн, воден от инструктор, виртуална класна стая. Курсът е част от сертификационната програма на Linux Professional Institute и служи за подготовка за сертифициране за ниво LPIC-1, както и за професионално развитие като Linux System Administrator и Linux IT специалист.

              Език на курса: български (английски е наличен като опция)

              Метериали: в електронен формат, включени в цената

              Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

              цената включва 40 уч.ч. онлайн обучение (теория и практика).

              Сертификат: всички участници получават сертификат за завършен курс.

              Метод на плащане: PayPal, банков превод, наложен платеж

              Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.


              Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

              След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

              Ако имате въпроси можете да се свържете с нас, чрез меню контакти.


              Съдържание:

              Topic 105: Shells, Scripting and Data Management

              105.1 Customize and use the shell environment

              Description: Candidates should be able to customize shell environments to meet users’ needs. Candidates should be able to modify global and user profiles.

              Key Knowledge Areas:

              Set environment variables (e.g. PATH) at login or when spawning a new shell

              Write Bash functions for frequently used sequences of commands

              Maintain skeleton directories for new user accounts

              Set command search path with the proper directory

              The following is a partial list of the used files, terms and utilities: source, /etc/bash.bashrc, /etc/profile, env, export, set, unset, ~/.bash_profile, ~/.bash_login, ~/.profile, ~/.bashrc, ~/.bash_logout, function, alias, lists


              105.2 Customize or write simple scripts

              Description: Candidates should be able to customize existing scripts, or write simple new Bash scripts.

              Key Knowledge Areas:

              Use standard sh syntax (loops, tests)

              Use command substitution

              Test return values for success or failure or other information provided by a command

              Perform conditional mailing to the superuser

              Correctly select the script interpreter through the shebang (#!) line

              Manage the location, ownership, execution and suid-rights of scripts

              Terms and Utilities: for, while, test, if, read, seq, exec


              105.3 SQL data management

              Description: Candidates should be able to query databases and manipulate data using basic SQL commands. This objective includes performing queries involving joining of 2 tables and/or subselects.

              Key Knowledge Areas:

              Use of basic SQL commands

              Perform basic data manipulation

              Terms and Utilities: insert, update, select, delete, from, where, group by, order by, join


              Topic 106: User Interfaces and Desktops

              106.1 Install and configure X11

              Description: Candidates should be able to install and configure X11.

              Key Knowledge Areas:

              Verify that the video card and monitor are supported by an X server

              Awareness of the X font server

              Basic understanding and knowledge of the X Window configuration file

              Terms and Utilities: /etc/X11/xorg.conf, xhost, DISPLAY, xwininfo, xdpyinfo, X


              106.2 Setup a display manager

              Description: Candidates should be able to describe the basic features and configuration of the LightDM display manager. This objective covers awareness of the display managers XDM (X Display Manger), GDM (Gnome Display Manager) and KDM (KDE Display Manager).

              Key Knowledge Areas:

              Basic configuration of LightDM

              Turn the display manager on or off

              Change the display manager greeting

              Awareness of XDM, KDM and GDM

              Terms and Utilities: lightdm, /etc/lightdm/


              106.3 Accessibility

              Description: Demonstrate knowledge and awareness of accessibility technologies.

              Key Knowledge Areas:

              Basic knowledge of keyboard accessibility settings (AccessX)

              Basic knowledge of visual settings and themes

              Basic knowledge of assistive technology (ATs)

              Terms and Utilities: Sticky/Repeat Keys, Slow/Bounce/Toggle Keys, Mouse Keys, High Contrast/Large Print Desktop Themes, Screen Reader, Braille Display, Screen Magnifier, On-Screen Keyboard, Gestures (used at login, for example GDM), Orca, GOK, emacspeak


              Topic 107: Administrative Tasks

              107.1 Manage user and group accounts and related system files

              Description: Candidates should be able to add, remove, suspend and change user accounts.

              Key Knowledge Areas:

              Add, modify and remove users and groups

              Manage user/group info in password/group databases

              Create and manage special purpose and limited accounts

              Terms and Utilities: /etc/passwd, /etc/shadow, /etc/group, /etc/skel/, chage, getent, groupadd, groupdel, groupmod, passwd, useradd, userdel, usermod


              107.2 Automate system administration tasks by scheduling jobs

              Description: Candidates should be able to use cron or anacron to run jobs at regular intervals and to use at to run jobs at a specific time.

              Key Knowledge Areas:

              Manage cron and at jobs

              Configure user access to cron and at services

              Configure anacron

              Terms and Utilities: /etc/cron.{d,daily,hourly,monthly,weekly}/, /etc/at.deny, /etc/at.allow, /etc/crontab, /etc/cron.allow, /etc/cron.deny, /var/spool/cron/, crontab, at, atq, atrm, anacron, /etc/anacrontab


              107.3 Localisation and internationalisation

              Description: Candidates should be able to localize a system in a different language than English. As well, an understanding of why LANG=C is useful when scripting.

              Key Knowledge Areas:

              Configure locale settings and environment variables

              Configure timezone settings and environment variables

              Terms and Utilities: /etc/timezone, /etc/localtime

              /usr/share/zoneinfo/

              LC_*

              LC_ALL

              LANG

              TZ

              /usr/bin/locale

              tzselect

              timedatectl

              date

              iconv

              UTF-8

              ISO-8859

              ASCII

              Unicode

              Topic 108: Essential System Services


              108.1 Maintain system time


              Weight: 3


              Description: Candidates should be able to properly maintain the system time and synchronize the clock via NTP.


              Key Knowledge Areas:


              Set the system date and time

              Set the hardware clock to the correct time in UTC

              Configure the correct timezone

              Basic NTP configuration

              Knowledge of using the pool.ntp.org service

              Awareness of the ntpq command

              Terms and Utilities:


              /usr/share/zoneinfo/

              /etc/timezone

              /etc/localtime

              /etc/ntp.conf

              date

              hwclock

              ntpd

              ntpdate

              pool.ntp.org


              108.2 System logging


              Weight: 3


              Description: Candidates should be able to configure the syslog daemon. This objective also includes configuring the logging daemon to send log output to a central log server or accept log output as a central log server. Use of the systemd journal subsystem is covered. Also, awareness of rsyslog and syslog-ng as alternative logging systems is included.


              Key Knowledge Areas:


              Configuration of the syslog daemon

              Understanding of standard facilities, priorities and actions

              Configuration of logrotate

              Awareness of rsyslog and syslog-ng

              Terms and Utilities:


              syslog.conf

              syslogd

              klogd

              /var/log/

              logger

              logrotate

              /etc/logrotate.conf

              /etc/logrotate.d/

              journalctl

              /etc/systemd/journald.conf

              /var/log/journal/


              108.3 Mail Transfer Agent (MTA) basics


              Weight: 3


              Description: Candidates should be aware of the commonly available MTA programs and be able to perform basic forward and alias configuration on a client host. Other configuration files are not covered.


              Key Knowledge Areas:


              Create e-mail aliases

              Configure e-mail forwarding

              Knowledge of commonly available MTA programs (postfix, sendmail, qmail, exim) (no configuration)

              Terms and Utilities:


              ~/.forward

              sendmail emulation layer commands

              newaliases

              mail

              mailq

              postfix

              sendmail

              exim

              qmail

              ~/.forward

              sendmail emulation layer commands

              newaliases


              108.4 Manage printers and printing


              Weight: 2


              Description: Candidates should be able to manage print queues and user print jobs using CUPS and the LPD compatibility interface.


              Key Knowledge Areas:


              Basic CUPS configuration (for local and remote printers)

              Manage user print queues

              Troubleshoot general printing problems

              Add and remove jobs from configured printer queues

              Terms and Utilities:


              CUPS configuration files, tools and utilities

              /etc/cups/

              lpd legacy interface (lpr, lprm, lpq)

              Topic 109: Networking Fundamentals


              109.1 Fundamentals of internet protocols


              Weight: 4


              Description: Candidates should demonstrate a proper understanding of TCP/IP network fundamentals.


              Key Knowledge Areas:


              Demonstrate an understanding of network masks and CIDR notation

              Knowledge of the differences between private and public “dotted quad” IP addresses

              Knowledge about common TCP and UDP ports and services (20, 21, 22, 23, 25, 53, 80, 110, 123, 139, 143, 161, 162, 389, 443, 465, 514, 636, 993, 995)

              Knowledge about the differences and major features of UDP, TCP and ICMP

              Knowledge of the major differences between IPv4 and IPv6

              Knowledge of the basic features of IPv6

              Terms and Utilities:


              /etc/services

              IPv4, IPv6

              Subnetting

              TCP, UDP, ICMP


              109.2 Basic network configuration


              Weight: 4


              Description: Candidates should be able to view, change and verify configuration settings on client hosts.


              Key Knowledge Areas:


              Manually and automatically configure network interfaces

              Basic TCP/IP host configuration

              Setting a default route

              Terms and Utilities:


              /etc/hostname

              /etc/hosts

              /etc/nsswitch.conf

              ifconfig

              ifup

              ifdown

              ip

              route

              ping


              109.3 Basic network troubleshooting


              Weight: 4


              Description: Candidates should be able to troubleshoot networking issues on client hosts.


              Key Knowledge Areas:


              Manually and automatically configure network interfaces and routing tables to include adding, starting, stopping, restarting, deleting or reconfiguring network interfaces

              Change, view, or configure the routing table and correct an improperly set default route manually

              Debug problems associated with the network configuration

              Terms and Utilities:


              ifconfig

              ip

              ifup

              ifdown

              route

              host

              hostname

              dig

              netstat

              ping

              ping6

              traceroute

              traceroute6

              tracepath

              tracepath6

              netcat


              109.4 Configure client side DNS


              Weight: 2


              Description: Candidates should be able to configure DNS on a client host.


              Key Knowledge Areas:


              Query remote DNS servers

              Configure local name resolution and use remote DNS servers

              Modify the order in which name resolution is done

              Terms and Utilities:


              /etc/hosts

              /etc/resolv.conf

              /etc/nsswitch.conf

              host

              dig

              getent

              Topic 110: Security


              110.1 Perform security administration tasks


              Weight: 3


              Description: Candidates should know how to review system configuration to ensure host security in accordance with local security policies.


              Key Knowledge Areas:


              Audit a system to find files with the suid/sgid bit set

              Set or change user passwords and password aging information

              Being able to use nmap and netstat to discover open ports on a system

              Set up limits on user logins, processes and memory usage

              Determine which users have logged in to the system or are currently logged in

              Basic sudo configuration and usage

              Terms and Utilities:


              find

              passwd

              fuser

              lsof

              nmap

              chage

              netstat

              sudo

              /etc/sudoers

              su

              usermod

              ulimit

              who, w, last


              110.2 Setup host security


              Weight: 3


              Description: Candidates should know how to set up a basic level of host security.


              Key Knowledge Areas:


              Awareness of shadow passwords and how they work

              Turn off network services not in use

              Understand the role of TCP wrappers

              Terms and Utilities:


              /etc/nologin

              /etc/passwd

              /etc/shadow

              /etc/xinetd.d/

              /etc/xinetd.conf

              /etc/inetd.d/

              /etc/inetd.conf

              /etc/inittab

              /etc/init.d/

              /etc/hosts.allow

              /etc/hosts.deny


              110.3 Securing data with encryption


              Weight: 3


              Description: The candidate should be able to use public key techniques to secure data and communication.


              Key Knowledge Areas:


              Perform basic OpenSSH 2 client configuration and usage

              Understand the role of OpenSSH 2 server host keys

              Perform basic GnuPG configuration, usage and revocation

              Understand SSH port tunnels (including X11 tunnels)

              Terms and Utilities:


              ssh

              ssh-keygen

              ssh-agent

              ssh-add

              ~/.ssh/id_rsa and id_rsa.pub

              ~/.ssh/id_dsa and id_dsa.pub

              /etc/ssh/ssh_host_rsa_key and ssh_host_rsa_key.pub

              /etc/ssh/ssh_host_dsa_key and ssh_host_dsa_key.pub

              ~/.ssh/authorized_keys

              ssh_known_hosts

              gpg

              ~/.gnupg/


              Официален Курс:  Linux Professional Institute LPIC-1 101 System Administrator

              COMPTIA LX0-103


              Курсът е част от сертификационната програма на Linux Professional Institute и служи за подготовка за сертифициране за ниво LPIC-1, както и за професионално развитие като Linux System Administrator и Linux IT специалист.

              Език на курса: български (английски е наличен като опция).

              Метериали: в електронен формат, включени в цената.

              Пакет от услуги включени към курса:

              • онлайн обучение
              • сертификат за завършен курс
              • достъп до виртуален лаб
              • книги и учебни материали
              • достъп до онлайн тестове
              • видео библиотека към курса - достъп до видео записи на сесиите към курса

              Курсът е подходящ за: junior Linux администратори; желаещи да се сертифицират за LPIC-1; желаещи да научат Linux и да повишат професионалната си квалификация.

              Интерактивен формат: участниците имат възможност да участват в дискусии, да задават въпроси, двупосочна връзка с интруктора в реално време, чрез виртуалната класна стая. Онлайн формата се провежда в реално време по график, участниците са свързани наживо, за разлика от видео курсовете при онлайн формата не се презентира видео запис.

              График: изберете удобен за вас график от падащото меню.  Курсът се провежда в удобно и съобразено с участниците време.

              Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

              Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

              Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

              Сертификат: всички участници получават сертификат за завършен курс.

              Метод на плащане: PayPal, банков превод, наложен платеж, брой.

              Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.


              Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

              След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

              Ако имате въпроси можете да се свържете с нас, чрез меню контакти.


              Съдържание:

              Topic 101: System Architecture

              101.1 Determine and configure hardware settings

              Key Knowledge Areas:

              • Tools and utilities to list various hardware information (e.g. lsusb, lspci, etc.)
              • Tools and utilities to manipulate USB devices
              • Conceptual understanding of sysfs, udev, dbus
              • The following is a partial list of the used files, terms and utilities:

              /sys/

              /proc/

              /dev/

              modprobe

              lsmod

              lspci

              lsusb


              101.2 Boot the system

              Key Knowledge Areas:

              • Provide common commands to the boot loader and options to the kernel at boot time
              • Demonstrate knowledge of the boot sequence from BIOS to boot completion
              • Understanding of SysVinit and systemd
              • Awareness of Upstart
              • Check boot events in the log files
              • Terms and Utilities:

              dmesg

              BIOS

              bootloader

              kernel

              initramfs

              init

              SysVinit

              systemd


              101.3 Change runlevels / boot targets and shutdown or reboot system

              Key Knowledge Areas:

              • Set the default runlevel or boot target
              • Change between runlevels / boot targets including single user mode
              • Shutdown and reboot from the command line
              • Alert users before switching runlevels / boot targets or other major system events
              • Properly terminate processes
              • Terms and Utilities:

              /etc/inittab

              shutdown

              init

              /etc/init.d/

              telinit

              systemd

              systemctl

              /etc/systemd/

              /usr/lib/systemd/

              wall


              Topic 102: Linux Installation and Package Management


              102.1 Design hard disk layout

              Key Knowledge Areas:

              • Allocate filesystems and swap space to separate partitions or disks
              • Tailor the design to the intended use of the system
              • Ensure the /boot partition conforms to the hardware architecture requirements for booting
              • Knowledge of basic features of LVM
              • Terms and Utilities:

              / (root) filesystem

              /var filesystem

              /home filesystem

              /boot filesystem

              swap space

              mount points

              partitions


              102.2 Install a boot manager

              Key Knowledge Areas:

              • Providing alternative boot locations and backup boot options
              • Install and configure a boot loader such as GRUB Legacy
              • Perform basic configuration changes for GRUB 2
              • Interact with the boot loader
              • The following is a partial list of the used files, terms and utilities:


              menu.lst, grub.cfg and grub.conf

              grub-install

              grub-mkconfig

              MBR


              102.3 Manage shared libraries

              • Key Knowledge Areas:
              • Identify shared libraries
              • Identify the typical locations of system libraries
              • Load shared libraries
              • Terms and Utilities:

              ldd

              ldconfig

              /etc/ld.so.conf

              LD_LIBRARY_PATH


              102.4 Use Debian package management

              Key Knowledge Areas:

              • Install, upgrade and uninstall Debian binary packages
              • Find packages containing specific files or libraries which may or may not be installed
              • Obtain package information like version, content, dependencies, package integrity and installation status (whether or not the package is installed)
              • Terms and Utilities:

              /etc/apt/sources.list

              dpkg

              dpkg-reconfigure

              apt-get

              apt-cache

              aptitude


              102.5 Use RPM and YUM package management

              Key Knowledge Areas:



              • Install, re-install, upgrade and remove packages using RPM and YUM
              • Obtain information on RPM packages such as version, status, dependencies, integrity and signatures
              • Determine what files a package provides, as well as find which package a specific file comes from
              • Terms and Utilities:


              rpm

              rpm2cpio

              /etc/yum.conf

              /etc/yum.repos.d/

              yum

              yumdownloader


              Topic 103: GNU and Unix Commands


              103.1 Work on the command line

              • Key Knowledge Areas:
              • Use single shell commands and one line command sequences to perform basic tasks on the command line
              • Use and modify the shell environment including defining, referencing and exporting environment variables
              • Use and edit command history
              • Invoke commands inside and outside the defined path
              • Terms and Utilities:

              bash

              echo

              env

              export

              pwd

              set

              unset

              man

              uname

              history

              .bash_history


              103.2 Process text streams using filters

              Key Knowledge Areas:

              • Send text files and output streams through text utility filters to modify the output using standard UNIX commands found in the GNU textutils package
              • Terms and Utilities:

              cat cut expandfmt head join less nl od paste pr sed sort split tail tr unexpand uniq wc


              103.3 Perform basic file management

              Key Knowledge Areas:

              • Copy, move and remove files and directories individually
              • Copy multiple files and directories recursively
              • Remove files and directories recursively
              • Use simple and advanced wildcard specifications in commands
              • Using find to locate and act on files based on type, size, or time
              • Usage of tar, cpio and dd
              • Terms and Utilities:

              cp

              find

              mkdir

              mv

              ls

              rm

              rmdir

              touch

              tar

              cpio

              dd

              file

              gzip

              gunzip

              bzip2

              xz

              file globbing


              103.4 Use streams, pipes and redirects

              Key Knowledge Areas:

              • Redirecting standard input, standard output and standard error
              • Pipe the output of one command to the input of another command
              • Use the output of one command as arguments to another command
              • Send output to both stdout and a file
              • Terms and Utilities:


              tee

              xargs


              103.5 Create, monitor and kill processes

              Key Knowledge Areas:

              • Run jobs in the foreground and background
              • Signal a program to continue running after logout
              • Monitor active processes
              • Select and sort processes for display
              • Send signals to processes
              • Terms and Utilities:

              &

              bg

              fg

              jobs

              kill

              nohup

              ps

              top

              free

              uptime

              pgrep

              pkill

              killall

              screen


              103.6 Modify process execution priorities

              Key Knowledge Areas:

              • Know the default priority of a job that is created
              • Run a program with higher or lower priority than the default
              • Change the priority of a running process
              • Terms and Utilities:


              nice

              ps

              renice

              top


              103.7 Search text files using regular expressions

              Key Knowledge Areas:

              • Create simple regular expressions containing several notational elements
              • Use regular expression tools to perform searches through a filesystem or file content
              • Terms and Utilities:

              grep

              egrep

              fgrep

              sed

              regex(7)


              103.8 Perform basic file editing operations using vi

              Key Knowledge Areas:

              • Navigate a document using vi
              • Use basic vi modes
              • Insert, edit, delete, copy and find text
              • Terms and Utilities:

              vi

              /, ?

              h,j,k,l

              i, o, a

              c, d, p, y, dd, yy

              ZZ, :w!, :q!, :e!


              Topic 104: Devices, Linux Filesystems, Filesystem Hierarchy Standard


              104.1 Create partitions and filesystems

              Key Knowledge Areas:

              • Manage MBR partition tables
              • Use various mkfs commands to create various filesystems such as:
              • ext2/ext3/ext4
              • XFS
              • VFAT
              • Awareness of ReiserFS and Btrfs
              • Basic knowledge of gdisk and parted with GPT
              • Terms and Utilities:


              fdisk

              gdisk

              parted

              mkfs

              mkswap


              104.2 Maintain the integrity of filesystems

              Key Knowledge Areas:

              • Verify the integrity of filesystems
              • Monitor free space and inodes
              • Repair simple filesystem problems
              • Terms and Utilities:


              du

              df

              fsck

              e2fsck

              mke2fs

              debugfs

              dumpe2fs

              tune2fs

              XFS tools (such as xfs_metadump and xfs_info)


              104.3 Control mounting and unmounting of filesystems

              Key Knowledge Areas:

              • Manually mount and unmount filesystems
              • Configure filesystem mounting on bootup
              • Configure user mountable removable filesystems
              • Terms and Utilities:


              /etc/fstab

              /media/

              mount

              umount


              104.4 Manage disk quotas

              Key Knowledge Areas:

              • Set up a disk quota for a filesystem
              • Edit, check and generate user quota reports
              • Terms and Utilities:


              quota

              edquota

              repquota

              quotaon


              104.5 Manage file permissions and ownership

              Key Knowledge Areas:

              • Manage access permissions on regular and special files as well as directories
              • Use access modes such as suid, sgid and the sticky bit to maintain security
              • Know how to change the file creation mask
              • Use the group field to grant file access to group members
              • Terms and Utilities:


              chmod

              umask

              chown

              chgrp


              104.6 Create and change hard and symbolic links

              Key Knowledge Areas:

              • Create links
              • Identify hard and/or soft links
              • Copying versus linking files
              • Use links to support system administration tasks
              • Terms and Utilities:


              ln

              ls


              104.7 Find system files and place files in the correct location

              Key Knowledge Areas:

              Understand the correct locations of files under the FHS

              Find files and commands on a Linux system

              Know the location and purpose of important file and directories as defined in the FHS

              Terms and Utilities:


              find

              locate

              updatedb

              whereis

              which

              type

              /etc/updatedb.conf



              Формат на курса: Онлайн, воден от инструктор, виртуална класна стая

              Език на курса: български (английски е наличен като опция).

              Метериали: в електронен формат, включени в цената.

              Пакет от услуги включени към курса:

              онлайн обучение

              сертификат за завършен курс

              достъп до виртуален лаб

              книги и учебни материали

              достъп до онлайн тестове

              видео библиотека към курса - достъп до видео записи на сесиите към курса

              Курсът е подходящ за: начинаещи в облачните технологии; желаещи да се сертифицират; желаещи да повишат професионалната си квалификация.

              График: изберете удобен за вас график от падащото меню.  Курса се провежда в удобно и съобразено с участниците време.

              Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

              Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

              Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

              Сертификат: всички участници получават сертификат за завършен курс.

              При отказ от достъп до лаб среда се предоставя отстъпка.


              При отказ от достъп до лаб среда се предоставя отстъпка.

              Допълнителна информация за съдържанието на курса можете на откриете на нашият сайт - http://www.it-training.pro

              Метод на плащане: PayPal, банков превод, наложен платеж, брой.


              Заявка за издаване на фактура се приема към момента на записването на съответния курс.

              Фактура се издава в рамките на 7 дни от потвърждаване на плащането.

              За повече информация използвайте формата за контакт.


              Дати на провеждане: моля използвайте календара в основният ни сайт.

              Ще се свържем с Вас за потвърждаване на датите.


              The AWS Certified Solutions Architect – Associate exam is intended for individuals with experience designing distributed applications and systems on the AWS platform. Exam concepts you should understand for this exam include:


              Designing and deploying scalable, highly available, and fault tolerant systems on AWS

              Lift and shift of an existing on-premises application to AWS

              Ingress and egress of data to and from AWS

              Selecting the appropriate AWS service based on data, compute, database, or security requirements

              Identifying appropriate use of AWS architectural best practices

              Estimating AWS costs and identifying cost control mechanisms

              Candidate Overview

              Eligible candidates for this exam have:

              One or more years of hands-on experience designing available, cost efficient, fault tolerant, and scalable distributed systems on AWS

              In-depth knowledge of at least one high-level programming language

              Ability to identify and define requirements for an AWS-based application

              Experience with deploying hybrid systems with on-premises and AWS components

              Capability to provide best practices for building secure and reliable applications on the AWS platform


              Introduction

              The AWS Certified Solutions Architect – Associate exam is intended for individuals who perform a Solutions

              Architect role. This exam validates an examinee’s ability to:

              • Identify and gather requirements in order to define a solution to be built using architecture best practices.

              • Provide guidance on architectural best practices to developers and system administrators throughout the

              lifecycle of the project.

              The knowledge and skills required at this level should include all of the following areas and objective components.

              The knowledge level can be defined as including the majority of the following skills or qualities:

              AWS Knowledge

              • Hands-on experience using compute, networking, storage, and database AWS services

              • Professional experience architecting large-scale distributed systems

              • Understanding of elasticity and scalability concepts

              • Understanding of the AWS global infrastructure

              • Understanding of network technologies as they relate to AWS

              • A good understanding of all security features and tools that AWS provides and how they relate to

              traditional services

              • A strong understanding of client interfaces to the AWS platform

              • Hands-on experience with AWS deployment and management services

              General IT Knowledge

              • Excellent understanding of typical multi-tier architectures: web servers, caching, application servers, load

              balancers, and storage

              • Understanding of Relational Database Management System (RDBMS) and NoSQL

              • Knowledge of message queuing and Enterprise Service Bus (ESB)

              • Familiarity with loose coupling and stateless systems

              • Understanding of different consistency models in distributed systems

              • Knowledge of Content Delivery Networks (CDN)

              • Hands-on experience with core LAN/WAN network technologies

              • Experience with route tables, access control lists, firewalls, NAT, HTTP, DNS, IP and OSI Network

              • Knowledge of RESTful Web Services, XML, JSON

              • Familiarity with the software development lifecycle

              • Work experience with information and application security concepts, mechanisms, and tools

              • Awareness of end-user computing and collaborative technologies

              These training courses or other equivalent methodologies will assist in exam preparation:

              • Architecting on AWS (aws.amazon.com/training/architect)

              • In-depth knowledge or training in at least one high-level programming language

              • AWS Cloud Computing Whitepapers (aws.amazon.com/whitepapers)

              o Overview of Amazon Web Services

              o Overview of Security Processes

              o AWS Risk & Compliance Whitepaper

              o Storage Options in the Cloud

              o Architecting for the AWS Cloud: Best Practices

              • Experience deploying hybrid systems with on-premises and AWS components

              • Use of the AWS Architecture Center website (aws.amazon.com/architecture)

              Note This examination blueprint includes weighting, test objectives, and example content. Example topics and

              concepts are included to clarify the test objectives; they should not be construed as a comprehensive listing of all

              of the content of this examination. 

              AWS Certified Solutions Architect

              Associate Level Exam Blueprint

              2

              The table below lists the domains measured by this examination and the extent to which they are represented.

              Domain % of Examination

              1.0 Designing highly available, cost-efficient, fault-tolerant, scalable systems 60%

              2.0 Implementation/Deployment 10%

              3.0 Data Security 20%

              4.0 Troubleshooting 10%

              TOTAL 100%

              Response Limits

              The examinee selects—from four or more response options—the one or multiple options that best complete the

              statement or answer the question. Distracters, or wrong answers, are response options that examinees with

              incomplete knowledge or skill would probably choose, and are generally plausible responses that fit into the

              content area defined by the test objective.

              Test item formats used in this examination are:

              • Multiple-choice: Examinee selects one option that best answers the question or completes a statement.

              The option can be embedded in a graphic where the examinee “points and clicks” on their selection

              choice to complete the test item.

              • Multiple-response: Examinee selects more than one option that best answers the question or completes

              a statement.

              • Sample Directions: Examinee reads the statement or question and, from the response options, selects

              only the options that represent the most correct or best answers given the information.

              Content Limits

              1 Domain 1.0: Designing highly available, cost-efficient, fault-tolerant, scalable systems

              1.1 Identify and recognize cloud architecture considerations, such as fundamental components and effective

              designs.

              Content may include the following:

              • How to design cloud services

              • Planning and design

              • Monitoring and logging

              • Familiarity with:

              o Best practices for AWS architecture

              o Developing to client specifications, including pricing/cost (e.g., on Demand vs. Reserved vs.

              Spot; RTO and RPO DR Design)

              o Architectural trade-off decisions (e.g., high availability vs. cost, Amazon Relational Database

              Service (RDS) vs. installing your own database on Amazon Elastic Compute Cloud (EC2))

              o Hybrid IT architectures (e.g., Direct Connect, Storage Gateway, VPC, Directory Services)

              o Elasticity and scalability (e.g., Auto Scaling, SQS, ELB, CloudFront)

              2 Domain 2.0: Implementation/Deployment

              2.1 Identify the appropriate techniques and methods using Amazon EC2, Amazon S3, AWS Elastic

              Beanstalk, AWS CloudFormation, AWS OpsWorks, Amazon Virtual Private Cloud (VPC), and AWS

              Identity and Access Management (IAM) to code and implement a cloud solution.

              Content may include the following:

              • Configure an Amazon Machine Image (AMI)

              • Operate and extend service management in a hybrid IT architecture

              • Configure services to support compliance requirements in the cloud

              • Launch instances across the AWS global infrastructure

              • Configure IAM policies and best practices

              AWS Certified Solutions Architect

              Associate Exam Blueprint

              3

              3 Domain 3.0: Data Security

              3.1 Recognize and implement secure practices for optimum cloud deployment and maintenance.

              Content may include the following:

              • AWS shared responsibility model

              • AWS platform compliance

              • AWS security attributes (customer workloads down to physical layer)

              • AWS administration and security services

              • AWS Identity and Access Management (IAM)

              • Amazon Virtual Private Cloud (VPC)

              • AWS CloudTrail

              • Ingress vs. egress filtering, and which AWS services and features fit

              • “Core” Amazon EC2 and S3 security feature sets

              • Incorporating common conventional security products (Firewall, VPN)

              • Design patterns

              • DoS mitigation

              • Encryption solutions (e.g., key services)

              • Complex access controls (building sophisticated security groups, ACLs, etc.)

              • Amazon CloudWatch for the security architect

              • Trusted Advisor

              • CloudWatch Logs

              3.2 Recognize critical disaster recovery techniques and their implementation.

              Content may include the following:

              • Disaster recovery

              o Recovery time objective

              o Recovery point objective

              o Amazon Elastic Block Store

              • AWS Import/Export

              • AWS Storage Gateway

              • Amazon Route53

              • Validation of data recovery method

              4 Domain 4.0: Troubleshooting

              Content may include the following:

              • General troubleshooting information and questions


              Формат на курса: Онлайн, провежда се в реално време от инструктор във виртуална класна стая.

              Език на курса: български (английски е наличен като опция).

              Метериали: в електронен формат, включени в цената.

              Пакет от услуги включени към курса:

              онлайн обучение

              сертификат за завършен курс

              достъп до виртуален лаб

              книги и учебни материали

              достъп до онлайн тестове

              видео библиотека към курса - достъп до видео записи на сесиите към курса

              Курсът е подходящ за: начинаещи Juniper или мрежови администратори; желаещи да се сертифицират за Juniper Networks JNCIA; желаещи да научат Juniper JUNOS и да повишат професионалната си квалификация.

              Интерактивен формат: участниците имат възможност да участват в дискусии, да задават въпроси, двупосочна връзка с интруктора в реално време, чрез виртуалната класна стая. Онлайн формата се провежда в реално време по график, участниците са свързани наживо, за разлика от видео курсовете при онлайн формата не се презентира видео запис.

              График: изберете удобен за вас график от падащото меню.  Курса се провежда в удобно и съобразено с участниците време.

              Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

              Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

              Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

              Сертификат: всички участници получават сертификат за завършен курс.

              При отказ от достъп до лаб среда се предоставя отстъпка.

              Допълнителна информация за съдържанието на курса можете на откриете на нашият сайт - http://www.it-training.bg

              Метод на плащане: PayPal, банков превод, наложен платеж, брой.


              Заявка за издаване на фактура се приема към момента на записването на съответния курс.

              Фактура се издава в рамките на 7 дни от потвърждаване на плащането.

              За повече информация използвайте формата за контакт.


              Дати на провеждане: моля използвайте календара в основният ни сайт.

              Ще се свържем с Вас за потвърждаване на датите.


              The Juniper Networks Certified Associate - JunOS (JNCIA-Junos) е задължително входно ниво, което се изисква за да се достигнат по - високите нива в сертифицирането на Juniper. Успешните кандидати демонстрират познаване на Junos OS на Juniper Networks, основни познания за мрежи, и основни познания за мрежовата маршрутизация и комутация.


              Проектиран за мрежови специалисти с начинаещ-междинен познания за работа в мрежа, този писмен изпит проверява разбирането на кандидата върху мрежовите основи, както и основната функционалност на Junos OS на Juniper Networks.


              Сертифицирането на JNCIA-Junos е валидно за срок от три години. Ресертификация се постига чрез  повторно преминаване на JN0-102 изпита или успешното взимане на по - горен изпит.


              Подробни изпит Цели включват:


              Networking Fundamentals

              JunOS OS Fundamentals

              потребителски интерфейси

              Основи на JunOS конфигурация

              Оперативен мониторинг и поддръжка

              основи на маршрутизиране

              Routing Политика и защитната стена - Филтри


              Networking Fundamentals

              Junos OS Fundamentals

              User Interfaces

              Junos Configuration Basics

              Operational Monitoring and Maintenance

              Routing Fundamentals

              Routing Policy and Firewall Filters


              Online Training Linux Foundation Certified System Administrator - LFCS



              Резултат с изображение за 100% guarantee

              Course Format: online instructor lead training in a virtual class room

              Language: Bulgarian (English optional)

              Course Files: digital format, price included in the course

              Lab environment: individual lab env. for each student.

              Course Duration40 learning hours online training (theory and practice).


              If lab access is not required by student, the price will be deduct. 

              Additional Information about the training content can be found on our web site - http://www.it-training.pro The ONline Training Academy

              Payment Method: PayPal, bank transfer, cash payments, wire transfer


              Invoice can be requested with a support request using our contacts page.

              The Invoice is issued normally in 7 days after the payment has been confirmed. 

              Additional information can be found using our contacts page.


              Training Dates: please check the IT Training Calendar in the main site. 

              We will contact you to confirm the dates and registration. 



              Linux is the #1 operating system for web servers, cloud computing, smart phones and consumer electronics. Because Linux is growing so quickly, there is a shortage of experienced Linux professionals. According to the 2015 Linux Jobs Report, 97% of hiring managers are looking to add Linux talent this year. There are 50,000+ open job listings requiring Linux on dice.com. And individuals with Linux skills are being recruited at an unprecedented rate. Demonstrate to employers that you have both the skills and the knowledge to be a top sysadmin with the Linux Foundation Certified System Administrator.

              LFS101

              Introduction to Linux

              1. The Linux Foundation
              2. Linux Philosophy and Concepts
              3. Linux Structure and Installation
              4. Graphical Interface
              5. System Configuration From The Graphical Interface
              6. Finding Linux Documentation
              7. Command Line Operators
              8. File Operations
              9. User Environment
              10. Text Editors
              11. Local Security Principles
              12. Network Operations
              13. Manipulating Text
              14. Printing
              15. Bash Shell Scripting
              16. Advanced Bash Scripting
              17. Processes
              18. Common Applications

              Essentials of System Administration (LFS201)

              Essentials of System Administration

              1. Preface
                • Introduction
                • Relationship to LFS101x
                • Using as LFCS Exam Preparation
                • Course Formatting
                • Read the Documentation
                • Target Platform
                • Command Line vs Graphical Interface
                • Target Linux Distributions
                • Installation: What to Use for this Course
                • Course Timing
                • Lab Exercises
                • Change, Repetition, and Holy Wars
                • The Linux Foundation
                • Linux Foundation Training
                • Labs
              2. System Startup and Shutdown
                • Understanding the Boot Sequence
                • BIOS
                • Boot Loaders
                • Configuration Files in /etc
                • /etc/sysconfig
                • /etc/default
                • Shutting Down and Rebooting
                • Labs
              3. GRUB
                • What is GRUB?
                • Interactive Selections with GRUB at Boot
                • Installing GRUB
                • GRUB Device Nomenclature
                • Customizing the GRUB Configuration File
                • Labs
              4. init: SystemV, Upstart, systemd
                • The init Process
                • Startup Alternatives
                • SysVinit Runlevels
                • SysVinit and /etc/inittab
                • SysVinit Startup Scripts
                • chkconfig
                • service
                • chkconfig and service on Debian-based Systems
                • Upstart
                • Upstart Utilities
                • systemd
                • systemd Configuration Files
                • Systemctl
                • Labs
              5. Linux Filesystem Tree Layout
                • One Big Filesystem
                • Data Distinctions
                • FHS Linux Standard Directory Tree
                • Main Directory Layout
                • The root (/) Directory and Filesystem
                • /bin
                • /boot
                • Other Files and Directories in /boot
                • /dev
                • /etc
                • /home
                • /lib
                • /media
                • /mnt
                • /opt
                • /proc
                • /sys
                • /root
                • /sbin
                • /tmp
                • /usr
                • /var
                • /run
                • Labs
              6. Kernel Services and Configuration
                • Kernel Overview
                • Main Kernel Tasks
                • Kernel Command Line
                • Kernel Boot Parameters
                • sysctl
                • Labs
              7. Kernel Modules
                • Advantages of Kernel Modules
                • Module Utilities
                • Module Loading and Unloading
                • modprobe
                • Some Considerations with Modules
                • modinfo
                • Module Parameters
                • Kernel Module Configuration
                • Labs
              8. Devices and udev
                • Device Nodes
                • Major and Minor Numbers
                • udev
                • udev Components
                • udev and Hotplug
                • The udev Device Manager
                • udev Rule Files
                • Creating udev Rules
                • Some Examples of Rules Files
                • Labs
              9. Partitioning and Formatting Disks
                • Common Disk Types
                • Disk Geometry
                • Partitioning
                • Why partition?
                • Partition Table
                • Naming Disk Devices and Nodes
                • More on SCSI Device Names
                • blkid and lsblk
                • Sizing up partitions
                • Backing up and Restoring Partition Tables
                • Partition table editors
                • Using fdisk
                • Labs
              10. Encrypting Disks
                • Why Use Encryption?
                • LUKS
                • cryptsetup
                • Using an Encrypted Partition
                • Mounting at Boot
                • Labs
              11. Linux Filesystems and the VFS
                • Filesystem Basics
                • Filesystem Tree Organization
                • Virtual File System (VFS)
                • Available Filesystems
                • Journalling Filesystems
                • Current Filesystem Types
                • Special Filesystems
                • Labs
              12. Filesystem Features: Attributes, Creating, Checking, Mounting
                • Inodes
                • Directory Files
                • Extended Attributes and lsattr/chattr
                • Creating and Formatting Filesystems
                • Checking and Fixing Filesystems
                • Mounting and Unmounting Filesystems
                • mount
                • mount Options
                • umount
                • Mounting Filesystems at Boot
                • Listing Currently Mounted Filesystems
                • Labs
              13. Filesystem Features: Swap, Quotas, Usage
                • Swap
                • Quotas
                • Setting up Quotas
                • quotacheck
                • Turning quotas on and off
                • Examining Quotas
                • Setting quotas
                • Filesystem Usage
                • Disk Space Usage
                • Labs
              14. The Ext2/Ext3/Ext4 Filesystems
                • Ext4 History and Basics
                • Ext4 Features
                • Ext4 Layout
                • Block Groups
                • dumpe2fs
                • tune2fs
                • Superblock Information
                • Data Blocks and Inodes
                • Ext4 Filesystem Enhancements
                • Labs
              15. The XFS and btrfs Filesystems
                • XFS Features
                • XFS Filesystem Maintenance
                • The btrfs Filesystem
                • Labs
              16. Logical Volume Management (LVM)
                • LVM
                • LVM and RAID
                • Volumes and Volume Groups
                • Logical Volumes Utilities
                • Creating Logical Volumes
                • Displaying Logical Volumes
                • Resizing Logical Volumes
                • Examples of Resizing
                • LVM Snapshots
                • Labs
              17. RAID
                • RAID
                • RAID Levels
                • Software RAID Configuration
                • Monitoring RAIDs
                • RAID Hot Spares
                • Labs
              18. Local System Security
                • Local System Security
                • Creating a Security Policy
                • What to Include in the Policy
                • What Risks to Assess
                • Choosing a Security Philosophy
                • Some General Security Guidelines
                • Updates and Security
                • Hardware Accessibility and Vulnerability
                • Hardware Access Guidelines
                • Protection of BIOS
                • Protecting the Boot Loader with Passwords
                • Filesystem Security: mount Options
                • setuid and setgid
                • Setting the setuid/setgid Bits
                • Labs
              19. Linux Security Modules
                • What are Linux Security Modules?
                • LSM Choices
                • SELinux Overview
                • SELinux Modes
                • SELinux Policies
                • Context Utilities
                • SELinux and Standard Command Line Tools
                • SELinux Context Inheritance and Preservation
                • restorecon
                • semanage fcontext
                • Using SELinux Booleans
                • getsebool and setsebool
                • Troubleshooting Tools
                • Additional Online Resources
                • AppArmor
                • Labs
              20. Processes
                • Processes, Programs and Threads
                • The init Process
                • Processes
                • Process Attributes
                • Controlling Processes with ulimit
                • Process Permissions and setuid
                • Process States
                • Execution Modes
                • User Mode
                • System Mode
                • Daemons
                • Kernel-Created Processes
                • Process Creating and Forking
                • Creating Processes in a Command Shell
                • Using nice to Set Priorities
                • Modifying the Nice Value
                • Labs
              21. Signals
                • What are Signals?
                • Types of Signals
                • kill
                • killall and pkill
                • Labs
              22. System Monitoring
                • Available Monitoring Tools
                • The /proc and /sys Pseudo-filesystems
                • /proc Basics
                • A Survey of /proc
                • /proc/sys
                • /sys Basics
                • A Survey of /sys
                • sar
                • Labs
              23. Process Monitoring
                • Monitoring Tools
                • Viewing Process States with ps
                • BSD Option Format for ps
                • ps Output Fields
                • UNIX Option Format for ps
                • Customizing the ps Output
                • Using pstree
                • Viewing System Loads with top
                • top Options
                • Labs
              24. I/O Monitoring and Tuning
                • Disk Bottlenecks
                • iostat
                • iostat Options
                • iostat Extended Options
                • iotop
                • Using ionice to Set I/O Priorities
                • Labs
              25. I/O Scheduling
                • I/O Scheduling
                • I/O Scheduler Choices
                • I/O Scheduling and SSD Devices
                • Tunables and Switching The I/O Scheduler at Run Time
                • CFQ (Completely Fair Queue Scheduler)
                • CFQ Tunables
                • Deadline Scheduler
                • Deadline Tunables
                • Labs
              26. Memory: Monitoring Usage and Tuning
                • Memory Tuning Considerations
                • Memory Monitoring Tools
                • /proc/sys/vm
                • vmstat
                • /proc/meminfo
                • OOM Killer
                • Labs
              27. Package Management Systems
                • Software Packaging Concepts
                • Why Use Packages?
                • Packages Types
                • Available Package Management Systems
                • Packaging Tool Levels and Varieties
                • Package Sources
                • Creating Software Packages
                • Labs
              28. RPM
                • RPM
                • Advantages of Using RPM
                • Package File Names
                • Database Directory
                • Helper Programs and Modifying Settings
                • Queries
                • Verifying Packages
                • Installing Packages
                • Uninstalling Packages
                • Upgrading Packages
                • Freshening Packages
                • Upgrading the Kernel
                • Using rpm2cpio
                • Labs
              29. DPKG
                • DPKG Essentials
                • Package File Names
                • Source Packages
                • DPKG Queries
                • Installing/Upgrading/Uninstalling Packages
                • Labs
              30. yum
                • Package Installers
                • What Is yum?
                • Configuring yum to Use Repositories
                • Repository Files
                • Queries
                • Verifying Packages
                • Installing/Removing/Upgrading Packages
                • Additional Commands
                • Labs
              31. zypper
                • What Is zypper?
                • zypper Queries
                • Installing/Removing/Upgrading
                • Additional zypper Commands
                • Labs
              32. APT
                • What Is APT?
                • apt-get
                • Queries Using apt-cache
                • Installing/Removing/Upgrading
                • Labs
              33. User Account Management
                • User Accounts
                • Attributes of a User Account
                • Creating User Accounts with useradd
                • Modifying and Deleting User Accounts
                • Locked Accounts
                • User IDs and /etc/passwd
                • /etc/shadow
                • Why Use /etc/shadow?
                • Password Management
                • chage: Password Aging
                • Restricted shell
                • Restricted Accounts
                • The root Account
                • SSH
                • ssh Configuration Files
                • Labs
              34. Group Management
                • Groups
                • Group Management
                • User Private Groups
                • Group Membership
                • Labs
              35. File Permissions and Ownership
                • Owner, Group and World
                • File Access Rights
                • File Permissions and Security and Authentication
                • Changing permissions: chmod
                • chmod: Numerical Syntax for Permissions
                • Changing User and Group File Ownership: chown and chgrp
                • umask
                • Filesystem ACLs
                • Getting and Setting ACLs
                • Labs
              36. Pluggable Authentication Modules (PAM)
                • PAM: A Unified Approach to Authentication
                • Authentication Process
                • PAM Configuration Files
                • PAM Rules
                • LDAP Authentication
                • Labs
              37. Backup and Recovery Methods
                • Why Backups?
                • What Needs Backup?
                • Tape Drives
                • Backup Methods
                • Backup Strategies
                • Backup Utilities
                • cpio
                • Using tar for Backups
                • Using tar for Restoring Files
                • Incremental Backups with tar
                • Compression: gzip, bzip2 and xz and Backups
                • dd
                • dd Examples
                • rsync
                • dump and restore
                • dump Options
                • Level 0 backup with dump
                • restore
                • mt
                • Backup Programs
                • Labs
              38. Network Addresses
                • IP Addresses
                • IPv4 Address Types
                • Special Addresses
                • IPv6 Address Types
                • IPv4 Address Classes
                • Netmasks
                • Hostname
                • Getting and Setting the Hostname
                • Labs
              39. Network Devices and Configuration
                • Network Devices
                • Problems with Network Device Names
                • Predictable Network Interface Device Names
                • Examples of the New Naming Scheme
                • NIC Configuration Files
                • ifconfig
                • The ip Utility
                • Examples of Using ip
                • Routing
                • Default Route
                • Static Routes
                • Name Resolution
                • /etc/hosts
                • DNS
                • Network Diagnostic Utilities
                • Labs
              40. Firewalls
                • What is a Firewall
                • Firewall Interfaces and Tools
                • firewalld
                • firewalld Service Status
                • Zones
                • Zone Management
                • Source Management
                • Service and Port Management
                • Labs
              41. Basic Troubleshooting
                • Troubleshooting Overview
                • Basic Techniques
                • Intuition and Experience
                • Things to Check: Networking
                • Things to Check: File Integrity
                • Boot Process Failures
                • Filesystem Corruption and Recovery
                • Using Rescue/Recovery Media
                • Common Utilities on Rescue/Recovery Disks
                • Using Rescue/Recovery Media
                • Labs
              42. System Rescue
                • Emergency Boot Media
                • Using Rescue Media
                • Rescue USB Key
                • Emergency Mode
                • Single User Mode
                • Labs

              http://www.it-training.pro/2016/12/25/70-334-core-solutions-of-microsoft-skype-for-business-2015/


              Module 1: Design and Architecture of Skype for Business Server 2015
              This module describes the high-level components and features of Skype for Business 2015. It also describes how to work with Skype for Business administrative tools, the main components of Skype for Business Online, and coexistence with on-premises Skype for Business Server 2015 servers.
              Lessons
              Overview of Skype for Business Components and Features
              Introduction to the Skype for Business Administrative Tools
              Lab : Designing and Publishing a Skype for Business Server Topology
              Designing and Creating the Topology
              Updating the Topology for the New York Site
              After completing this module, students will be able to:
              Describe the high-level components and features of Skype for Business 2015.
              Work with Skype for Business administrative tools.
              Module 2: Installing and Implementing Skype for Business Server 2015
              This module explains the external dependencies for Skype for Business Server. It describes the Session Initiation Protocol (SIP) domain requirements to ensure a successful implementation. This module also explains how to install Skype for Business Server, and it describes how Skype for Business Server integrates with Exchange Server and Microsoft SharePoint Server.
              Lessons
              Server and Service Dependencies
              Planning SIP Domains
              Installing Skype for Business Server
              Integrating Skype for Business Server with Exchange Server and SharePoint Server
              Lab : Configuring DNS and Simple URLs for Skype for Business Server
              Configuring the Required DNS Records and Simple URLs for Skype for Business Server
              Lab : Deploying Skype for Business Server
              Installing and Configuring Skype for Business Server
              Installing Skype for Business Server Certificates
              After completing this module, students will be able to:
              Identify the external dependencies for Skype for Business Server 2015.
              Identify the SIP domain requirements to ensure a successful implementation.
              Install Skype for Business Server.
              Describe how Skype for Business Server integrates with Exchange Server and SharePoint Server.
              Module 3: Administering Skype for Business Server 2015
              This module explains how to administer and manage Skype for Business Server by using Skype for Business Server Control Panel and the Skype for Business Server Management Shell. It also describes how to create useful Skype for Business scripts to automate processes. Additionally, it explains how to implement role-based access control (RBAC) in Skype for Business and how to use important Test cmdlets and tools to troubleshoot Skype for Business.
              Lessons
              Using Skype for Business Server Control Panel
              Using the Skype for Business Server Management Shell
              Implementing Role-Based Access Control
              Using Test Cmdlets
              Tools for Troubleshooting Skype for Business
              Lab : Using the Administrative Tools to Manage Skype for Business Server
              Installing the Skype for Business Administrative Tools on a Windows 10 Client
              Using Skype for Business Server Control Panel
              Using the Skype for Business Server Management Shell
              Lab : Using the Skype for Business Troubleshooting Tools
              Using Skype for Business Server Management Shell Cmdlets to Create an RBAC Structure
              Using the Centralized Logging Service
              Performing a Network Capture by Using Message Analyzer
              After completing this module, students will be able to:
              Use Skype for Business Server Control Panel.
              Use the Skype for Business Server Management Shell.
              Implement RBAC in Skype for Business 2015.
              Use important test cmdlets.
              Use various tools to troubleshoot Skype for Business.
              Module 4: Configuring Users and Clients in Skype for Business 2015
              This module explains how to configure users by using Skype for Business Server Control Panel and the Skype for Business Server Management Shell. It then describes how to deploy Skype for Business clients and explains the sign-in, registration, and authentication process for Skype for Business clients. It also explains how to configure in-band policies and group policies. Finally, it explains how to manage the Skype for Business Address Book.
              Lessons
              Configuring Users
              Deploying the Skype for Business Client
              Registration, Sign-In, and Authentication
              Configuring Skype for Business Client Policies
              Managing the Skype for Business Address Book
              Lab : Configuring Users and Clients in Skype for Business 2015
              Enabling Users for Skype for Business by Using the Management Shell
              Troubleshooting a User Sign-In Issue
              Lab : Configuring Policies and the Address Book in Skype for Business Server
              Configuring Client Policies
              Configuring the Address Book
              After completing this module, students will be able to:
              Configure users by using Skype for Business Server Control Panel and the Skype for Business Server Management Shell.
              Deploy Skype for Business clients.
              Explain the registration, sign-in, and authentication process for Skype for Business clients.
              Configure in-band policies and Group Policies.
              Describe how to manage the Skype for Business Address Book.
              Module 5: Configuring and Implementing Conferencing in Skype for Business 2015
              This modules describes Skype for Business conferencing features and modalities. It explains how to integrate Skype for Business Server 2015 with Office Online Server. It also explains how to plan for conferencing bandwidth utilization. Finally, it explains how to configure conferencing settings and policies.
              Lessons
              Introduction to Conferencing in Skype for Business 2015
              Integrating Skype for Business Server and Office Online Server
              Bandwidth Planning
              Configuring Conferencing Settings
              Lab : Installing and Configuring Office Online Server
              Installing Office Online Server
              Lab : Configuring Conferencing in Skype for Business Server
              Configuring, Assigning, and Validating Conferencing Policies
              After completing this module, students will be able to:
              Describe Skype for Business conferencing features and modalities.
              Integrate Skype for Business Server 2015 with Office Web Apps Server.
              Plan for conferencing bandwidth utilization.
              Configure conferencing settings and policies.
              Module 6: Implementing Additional Conferencing Options in Skype for Business Server 2015
              This module describes the conferencing lifecycle and explains how to administer it. It then explains how to use conferencing and meeting policies. It also explains how to deploy dial-in conferencing and configure the infrastructure for Lync Room System. Finally, it explains how to configure large meetings and Skype Meeting Broadcast.
              Lessons
              Overview of the Conferencing Lifecycle
              Designing and Configuring Audio/Video and Web Conferencing Policies
              Deploying Dial-In Conferencing
              Configuring an LRS
              Configuring Large Meetings and Skype Meeting Broadcasts
              Lab : Implementing and Troubleshooting Conferencing Policy
              Creating and Editing Conferencing Policies
              Troubleshooting Conferencing Policies
              Lab : Configuring Additional Conferencing Modalities
              Deploying Dial-In Conferencing
              Preparing for LRS Deployment
              After completing this module, students will be able to:
              Administer the conferencing lifecycle.
              Configure conferencing and meeting policies.
              Deploy dial-in conferencing.
              Configure the infrastructure for Lync Room System (LRS).
              Configure large meetings and Skype Meeting Broadcast.
              Module 7: Designing and Implementing Monitoring and Archiving in Skype for Business 2015
              This module describes the Monitoring Service components in Skype for Business Server. It then describes archiving and explains how to design an archiving policy. Finally, it explains how to implement archiving.
              Lessons
              Components of the Monitoring Service
              Overview of Archiving
              Designing an Archiving Policy
              Implementing Archiving
              Lab : Implementing Monitoring
              Enabling Monitoring Reports
              Lab : Implementing Archiving
              Enabling Skype for Business Server Archiving to Microsoft Exchange Server 2013
              After completing this module, students will be able to:
              Describe Monitoring Service components in Skype for Business Server.
              Implement monitoring.
              Design an archiving policy.
              Implement archiving.
              Module 8: Deploying Skype for Business 2015 External Access
              This module describes the components for external access. It then explains how to configure external access policies and security, how to configure certificates, and how to configure reverse proxy. Additionally, this module describes how to configure Skype for Business Server 2015 for mobile clients. Finally, it explains how to design and configure federation in Skype for Business Server.
              Lessons
              Overview of External Access
              Configuring External Access Policies and Security
              Configuring External Access Network and Certificates
              Configuring Reverse Proxy
              Designing Mobility in Skype for Business Server
              Designing Federation in Skype for Business Server
              Lab : Designing and Implementing External User Access
              Defining the Edge Server in the Topology
              Installing and Configuring the Edge Server
              Lab : Installing the Components for External Users
              Installing and Configuring Reverse Proxy
              Validate External Messaging
              After completing this module, students will be able to:
              Identify the components for external access.
              Configure external access policies and security.
              Configure external access network and certificates.
              Configure reverse proxy.
              Configure Skype for Business Server 2015 for mobile clients.
              Design and configure federation in Skype for Business Server.
              Module 9: Implementing Persistent Chat in Skype for Business 2015
              This module explains how to design a Skype for Business 2015 topology that includes Persistent Chat. It then explains how to deploy Persistent Chat in Skype for Business. Finally, it explains how to configure and manage Persistent Chat.
              Lessons
              Designing a Persistent Chat Server Topology
              Deploying Persistent Chat Server
              Configuring and Managing Persistent Chat
              Lab : Designing and Deploying Persistent Chat Server
              Configuring the Topology for Persistent Chat Server
              Installing Persistent Chat Server
              Registering a New Add-In
              Lab : Configuring and Using Persistent Chat
              Configuring Chat Rooms and Policies
              Validating a Persistent Chat Deployment
              Troubleshooting Persistent Chat
              After completing this module, students will be able to:
              Design a Skype for Business topology that includes Persistent Chat.
              Deploy Persistent Chat in Skype for Business.
              Configure and manage Persistent Chat in Skype for Business.
              Module 10: Implementing High Availability in Skype for Business 2015
              This module describes how to design and implement a high-availability solution for Front End Servers and Back End Servers in a Skype for Business Server environment. It also explains how to design and implement a high-availability solution for file stores, Edge Servers, Mediation Servers, Office Online server farms, and reverse proxy servers in a Skype for Business Server environment.
              Lessons
              Planning for Front End Pool High Availability
              Planning for Back End Server High Availability
              High Availability for Other Component Servers
              Lab : Pre-Lab Configuration
              Preparing for the Lab
              Lab : Implementing High Availability
              Managing Front End Pools
              Configuring Hardware Load Balancing
              After completing this module, students will be able to:
              Design and implement a high-availability solution for Front End Servers in a Skype for Business Server environment.
              Design and implement a high-availability solution for Back End Servers in a Skype for Business Server environment.
              Design and implement a high-availability solution for file stores, Edge Servers, Mediation Servers, Office Online Server farms, and reverse proxy servers in a Skype for Business Server environment.
              Module 11: Implementing Disaster Recovery in Skype for Business 2015
              This module describes the disaster recovery options in Skype for Business Server, such as Front End pool pairing and Persistent Chat Server stretched pools. It then explains how to implement disaster recovery in Skype for Business Server. Additionally, it describes the disaster recovery options for Persistent Chat, the Central Management store, the Location Information Service (LIS) database, and user data.
              Lessons
              Disaster Recovery Options in Skype for Business Server
              Implementing Disaster Recovery in Skype for Business Server
              Additional Disaster Recovery Options in Skype for Business Server
              Lab : Implementing and Performing Disaster Recovery
              Configuring Pool Pairing
              Perform Pool Failover and Failback
              After completing this module, students will be able to:
              Describe disaster recovery options in Skype for Business Server.
              Implement disaster recovery in Skype for Business Server.
              Describe the disaster recovery options for Persistent Chat, the Central Management store, the Location Information Service (LIS) database, and user data.
              Module 12: Integrating with Skype for Business Online
              This module describes Skype for Business Online features. It then explains how to prepare an on-premises environment for a hybrid Skype for Business deployment. It also explains how to configure a hybrid Skype for Business deployment.
              Lessons
              Overview of Skype for Business Online
              Preparing for a Hybrid Skype for Business Deployment
              Configuring a Hybrid Skype for Business Environment
              Lab : Designing a Hybrid Skype for Business Deployment
              Designing the Hybrid Skype for Business Environment
              After completing this module, students will be able to:
              Describe Skype for Business Online features.
              Prepare an on-premises environment for a hybrid Skype for Business deployment.
              Configure a hybrid Skype for Business deployment.
              Module 13: Planning and Implementing an Upgrade to Skype for Business Server 2015
              This module describe how to plan a side-by-side migration from Lync Server 2010 and Lync Server 2013 to Skype for Business Server 2015. It also explains how to perform an in-place upgrade from Lync Server 2013 to Skype for Business Server.
              Lessons
              Overview of Upgrade and Migration Paths
              Migrating to Skype for Business 2015
              In-Place Upgrade to Skype for Business Server 2015
              Lab : Performing an In-Place Upgrade of Lync 2013 to Skype for Business
              Install Skype for Business Administrative Tools
              Performing In-Place Upgrade from Lync Server 2013 to Skype for Business Server 2015
              After completing this module, students will be able to:
              Describe the supported migration and upgrade paths for Skype for Business Server.
              Perform an in-place upgrade of Lync Server 2013 to Skype for Business Server.
              Describe how to manage the user experience during an upgrade.

              http://www.it-training.pro/2016/12/25/70-333-deploying-enterprise-voice-with-skype-for-business-2015/


              Module 1: Introduction to Voice Workloads
              Designing a Skype for Business voice solution requires the understanding of many technologies. With Microsoft’s latest cloud based voice services, customers now have even more flexibility in deploying a voice solution for their enterprise, but with that flexibility comes further complexities that must be understood. In this module, you will learn about basic VoIP concepts, how they evolved from early telephony technologies, as well as Office 365 services and Microsoft’s entry into the voice world. You will also learn about on-premises and cloud based voice offerings now available as part of the Skype for Business product set.
              Lessons
              Voice Overview
              Designing Voice Workloads
              Skype for Business Ecosystem
              SIP Basics and Routing
              Lab : Customizing Your Lab Environment
              Configuring the On-Premises Organization
              After completing this module, students will be able to:
              Describe the different options available across various possible voice architectures with Skype for Business Server 2015 and Skype for Business Online.
              Explain how cloud technologies are changing the design, deployment, and management of voice architectures.
              Relate their prior experience to what they will learn throughout the course.
              Module 2: Assess Network and Voice Deployment Options
              In this module, you will learn how to perform a network readiness assessment for an implementation of Skype for Business Server 2015 or Skype for Business Online. This module coincides with the Skype Operations Framework (SOF) Plan phase. Specifically, this module aligns with the Envision, Assess, and Design stages. You will learn about Skype for Business Online and Skype for Business Server 2015 features and functionality. You will also learn the supported architectures for Skype for Business Online and Skype for Business Server 2015.
              Lessons
              Network Planning and Assessment
              Skype for Business Features and Functionality
              Plan your Cloud PBX Solution
              Lab : Configuring Identity Federation with Office 365
              Adding a Custom Domain and Enabling Directory Synchronization in Office 365
              Performing Directory Synchronization
              Installing and Configuring Active Directory Federation Services
              Enabling Single Sign-On with Office 365
              After completing this module, students will be able to:
              Describe the phases of network assessment.
              Identify Skype for Business Online plans.
              Describe the supported voice architectures.
              Choose a voice architecture for a given scenario.
              Module 3: Split Domain Configuration
              In this module, you will learn what is meant by the term split domain and what it describes relative to the Skype for Business product. You will also learn the benefits of split domain, the prerequisites needed to deploy this environment, and how to provision users once it’s been configured. Finally, you will learn to troubleshoot common issues.
              Lessons
              Split Domain Overview
              Split Domain Requirements
              Split Domain Deployments
              User Provisions and Migration
              Troubleshooting Split Domain Related Issues
              Lab : Setting up Split Domain with Skype for Business Online
              Setting up Split Domain with Skype for Business Online
              Moving Users to Skype for Business Online
              Verifying the Split Domain Skype for Business User Experience
              Managing Users in Skype for Business Online
              
              After completing this module, students will be able to deploy and configure an environment where users of a domain are split between using Skype for Business Server 2015 and Skype for Business Online.
              
              Module 4: Cloud PBX with PSTN Calling and Conferencing
              Cloud PBX is a Microsoft-based PBX solution offered in Office 365. Cloud PBX enables organizations to eliminate their existing PBX infrastructure and migrate PBX functionality, as well as existing telephone numbers, to Office 365. Public Switch Telephone Network (PSTN) Calling provides a PSTN connection for users via Microsoft Calling Plans. PSTN Conferencing has been integrated into Skype for Business Online Meetings capability in Office 365 which allow users to create, manage, and host their own online meetings with PSTN integration for easy dial-in access.
              Lessons
              Cloud PBX with PSTN Calling Features
              PSTN Conferencing and Meeting Features
              Skype for Business Server 2015 Dial-in Conferencing
              Lab : Configuring Cloud PBX with PSTN Calling
              Enabling Users for PSTN Calling in Skype for Business Online
              Using Online PSTN Calling Features
              Enabling Users for Cloud PSTN Conferencing
              Using PSTN Conferencing in Skype for Business Online
              After completing this module, students will be able to:
              
              Describe Cloud PBX with PSTN Calling features and conferencing
              Deploy and configure conference and meeting features
              Deploy and configure PSTN Conferencing  
              Module 5: Enterprise Voice (On-Premises)
              In this module, you will learn about Skype for Business Server 2015 Enterprise Voice. Enterprise Voice is a unified communications solution delivered by Skype for Business Server 2015. Enterprise Voice enables organizations to send and receive calls via the Publicly Switched Telephone Network (PSTN). You will learn how to configure voice components like Dial Plans, Voice Policies, and Routes that are an integral part of the Enterprise Voice solution.
              Lessons
              Designing Enterprise Voice
              Configuring Enterprise Voice
              Voice Routing
              Assigning Phone Numbers
              Client Configuration
              Unified Messaging
              Lab : Configuring Enterprise Voice
              Build a Regular Expression
              Configuring Dial Plans
              Configuring a Voice Policy, PSTN Usage, and Route
              Assigning User Dial Plans and Policies
              Test Voice Routing
              Configure the London Dial Plan
              After completing this module, students will be able to:
              Design and implement Skype for Business Enterprise Voice.
              Configure Enterprise Voice settings, including dial plans, voice policy, PSTN usage, voice routes, trunks, and numbering plans for DID and extensions.
              Describe Skype for Business Voice Routing.
              Integrate Exchange Unified Messaging with Skype for Business Server 2015.
              Configure Skype for Business client voice features.
              
              Module 6: PSTN Connectivity
              A key component to a successful organization is the ability to communicate between internal employees and customers and partners. In order for this to happen organizations need to bridge communications between their internal communications systems such as Skype for Business Server 2015 and the public switched telephone network by using an existing Public Branch Exchange (PBX), gateway, or Internet service provider (ISP). Connection to the PSTN enables enterprise users to make and receive calls from external numbers by using the same Skype for Business client used for internal calls. In addition, employees can leverage the broad range of Skype for Business features to improve their communications interactions with external users connected through the PSTN.
              Lessons
              Connecting to the PSTN
              Connecting to the Existing PBX
              M:N Interworking Routing
              Call Routing Reliability
              Call via Work
              Shared Line Appearance
              IP Phones
              Room Systems
              Mobile
              Lab : Configuring Integration with an IP-PBX
              Configuring Enterprise Voice Settings for London
              Configuring Inter-Trunk Routing
              Research Skype for Business Server 2015 Integration Settings
              Configuring IP-PBX Integration Settings
              After completing this module, students will be able to:
              Plan for the Mediation Server role.
              Connect Skype for Business Server 2015 to the PSTN.
              Implement M:N interworking routing.
              Define a reliable route for calls by using the PSTN.
              Describe Call via Work.
              Describe Shared Line Appearance.
              Module 7: Cloud PBX with On-Premises PSTN Connectivity using an Existing Deployment
              This module discusses the implementation and configuration of Cloud PBX with an on-premises PSTN with an existing deployment. With many options for implementation, students should be familiar with the different methods and connectivity options. Implementing Cloud PBX requires a tenant with Office 365 and a network infrastructure that can be utilized for users at an office or on a public internet connection. It is important to remember that dial-in conferencing needs to be implemented via PSTN Conferencing or Audio Conferencing Provider (ACP). On-Premises PSTN Connectivity with Cloud Connector Edition will be covered in the next module.
              Lessons
              Call Flows and Manageability
              Lab : Call Flows and Manageability
              * Exercise 1: Testing the Current PBX Calling Solution
              * Exercise 2: Enabling Cloud PBX with On-Premises PSTN Connectivity
              * Exercise 3: Testing Cloud PBX with On-Premises PSTN Connectivity
              After completing this module, students will be able to:
              * Explain Cloud PBX with On-Premises PSTN Connectivity architectures and scenarios
              Module 8: Cloud PBX with On-Premises PSTN Connectivity using Cloud Connector Edition
              Enterprises that have a voice solution on-premises that does not include Skype for Business Server 2015 or Lync Server 2013 can still integrate their current solution with Skype for Business Online by leveraging Cloud Connector Edition (CCE). It is important to choose the correct topology for CCE in order to support an organization’s voice requirements. This module will review the different supported topologies and provide guidance on the deployment process.
              Lessons
              Introduction to Cloud Connector Edition
              Planning PSTN Connectivity via Cloud Connector Edition
              Deploying Cloud Connector Edition
              Lab : Deploying Cloud Connector Edition
              Configuring the Lab Organization
              Prepare First Cloud Connector Edition High Availability Appliance
              Prepare Second Cloud Connector Edition High Availability Appliance
              Create Base VHDX for Cloud Connector Edition Virtual Machines
              Deploy First Cloud Connector Edition High Availability Appliance
              Configure Office 365 Tenant
              Test Cloud PBX with On-Premises PSTN Connectivity
              Deploy Second Cloud Connector Edition High Availability Appliance
              Complete and Testing Cloud Connector Edition High Availability
              Test Cloud Connector Edition Management Service Auto Recovery
              After completing this module, students will be able to:
              Know when Cloud Connector Edition is the right solution for an organization.
              Identify Cloud Connector Edition requirements.
              Deploy and manage Cloud Connector Edition.
              Module 9: Enhanced Calling Features and Device Requirements
              Enterprise Voice provides a number of specific on-premises features such as call parking, unassigned numbers, PSTN conferencing, and Response Groups. It also builds on the basic Enterprise Voice deployment scenario introduced earlier in the course. To use Enterprise Voice, you need to know about the various Enterprise Voice applications and how to implement and configure them. You will explore the Skype for Business Server Response Group Service (RGS) in some depth, including components such as RGS agent groups, RGS queues, hunt groups or basic workflows, and Interactive Voice response workflows. In addition, you should be able to describe the Attendant routing method.
              Lessons
              Call Park Service
              Managing Calls to Unassigned Numbers
              Delegation and Private Lines
              Response Group Services
              Location Information Services and E9-1-1
              Lab : Configuring Response Groups
              Configuring Agent Groups and Queues
              Configuring Workflows
              Verifying the Response Group Service Behavior
              Lab : Configuring Location Information Services and Managing Devices
              Creating Emergency Routes and PSTN Usages
              Configuring Number Manipulation on Trunks for Emergency Numbers
              Defining LIS Locations
              Experiencing LIS Features
              After completing this module, students will be able to:
              Explain the various voice features.
              Configure calling features that extend Skype for Business Enterprise Voice functionality.
              Configure call distribution with response groups.
              Make devices location aware with Location Information Service.
              Manage devices in Skype for Business Server 2015.
              Module 10: Network Requirements
              In this module, you will learn how to optimize voice communications on a network by planning for network consumption and implementing bandwidth optimizing technologies such as call admission control (CAC), quality of service (QoS), and software defined networks (SDN). You will also learn the media stacks available for Skype for Business Server 2015 and Skype for Business Online.
              Lessons
              Media Stacks
              Traffic Modeling
              Quality of Service
              Software-Defined Networking
              Overview of Call Admission Control
              Implementing Call Admission Control
              Software-Defined Networking
              Lab : Managing Voice Quality
              Entering information into the Skype for Business Bandwidth Calculator
              Reviewing Calculated Results
              Configuring Quality of Service
              Verifying the Quality of Service Application
              Configuring Call Admission Control to Manage Bandwidth
              Analyzing DSCP Values and Port Ranges for Prioritizing Network Traffic (Bonus Exercise
              After completing this module, students will be able to:
              Explain the media stacks available for Skype for Business Server 2015 and Skype for Business Online.
              Plan for network consumption.
              Optimize voice communications on a network.
              Implement bandwidth-optimizing technologies such as call admission control (CAC), quality of service (QoS), and software-defined networks (SDN).
              Module 11: Monitoring and Maintaining Voice Quality
              Asserting, achieving, and maintaining call quality are imperative for a successful Skype for Business deployment, especially for voice and conferencing workloads. This module will detail Microsoft’s Call Quality Methodology as both a process and toolset that can be used to achieve these goals. Call Quality Scorecard, along with its accompanying script and the Call Quality Dashboard, will be described as additional tools to measure and maintain call quality goals set by an organization. The module will also show how to leverage native Skype for Business tools and datasets to help troubleshoot and further refine deployment quality.
              Lessons
              Call Quality Methodology
              Call Quality Dashboard
              Monitoring Tools
              Usage Reports and Monitoring
              Lab : Deploying Call Quality Dashboard, Analyzing Reports, and Capturing KHI
              Installing the Skype Call Quality Dashboard
              Using the Skype Call Quality Dashboard
              Analyze Peer-to-Peer Session Detail Reports
              Troubleshoot Media Quality Reports
              Monitoring Synthetic Transactions
              Monitoring Server Health
              After completing this module, students will be able to:
              Leverage the Call Quality Methodology (CQM) and monitoring tools.
              Effectively define and assert call quality.
              Module 12: Voice Troubleshooting
              Troubleshooting is a basic skill that is required to support Skype for Business Server deployments. Skype for Business infrastructure can be deployed in a variety of topologies, as has been described throughout this course. Skype for Business administrators should be familiar with both the core tools and the troubleshooting methods that apply specifically to Skype for Business Online and Skype for Business Server 2015. This module will introduce tools and methodologies for troubleshooting Skype for Business client, Skype for Business Server 2015, and Skype for Business Online. Various scenarios will be explored to provide familiarity with some of the common issues administrators face.
              Lessons
              Troubleshooting Call Quality
              Troubleshooting Scenarios
              Troubleshooting Skype for Business Online Voice
              Troubleshooting IP Phones
              Lab : Troubleshoot Dial Plans, Routing, and Trunks
              Reviewing the Centralized Logging Service Components
              Using the CLS Logger Tool
              Tracing Fundamentals
              Identifying Dial Plan Misconfiguration
              Troubleshooting Voice Routing Issues
              After completing this module, students will be able to:
              Troubleshoot call quality.
              Identify troubleshooting tools.
              Identify troubleshooting scenarios.
              Use troubleshooting methodology to research, diagnose, and remediate call quality issues.
              Troubleshoot common Skype for Business Online client issues.
              Troubleshoot IP Phones.




              Онлайн Курс Microsoft 70-741 Networking with Windows Server 2016

              IT-Training гарантира 100% удовлетворение от курса. За повече информация прегледайте политиката ни за 100% удовлетворение.

              Официален Microsoft курс (Microsoft Official Course - MOC 20741B) - Курсът е съгласно програмата на Microsoft и основната му цел е подготовка за сертифициране за Windows Server 2016 - Microsoft Certified Solutions Associate MCSA Windows Server 2016, както и за повишаване на професионалните умения и квалификация.

              Формат на курса: Онлайн, Microsoft Official Course, провежда се в реално време от сертифициран инструктор във виртуална класна стая.

              Език на курса: български (английски е наличен като опция).

              Метериали: в електронен формат, включени в цената.

              Пакет от услуги включени към курса:

              • онлайн обучение
              • сертификат за завършен курс
              • достъп до виртуален лаб
              • книги и учебни материали
              • достъп до примерни онлайн тестове
              • видео библиотека към курса - достъп до видео записи на сесиите към курса

              Курсът е подходящ за: начинаещи в Windows или системната администрация; желаещи да се сертифицират за MCSA Windows Server 2016; желаещи да научат Windows Server 2016 и да повишат професионалната си квалификация.

              Интерактивен формат: участниците имат възможност да участват в дискусии, да задават въпроси, двупосочна връзка с интруктора в реално време, чрез виртуалната класна стая. Онлайн формата се провежда в реално време по график, участниците са свързани наживо, за разлика от видео курсовете при онлайн формата не се презентира видео запис.

              График: изберете удобен за вас график от падащото меню.  Курса се провежда в удобно и съобразено с участниците време.

              Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

              Примерни тестове: позволяват да проверите подготовката си за  сертификационен изпит с примерни въпроси.

              Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

              Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

              Сертификат: всички участници получават сертификат за завършен курс.

              Метод на плащане: PayPal, банков превод, наложен платеж, брой.

              Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.


              Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

              След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

              Ако имате въпроси можете да се свържете с нас, чрез меню контакти.



              След завършване на курса студентите ще могат да:

              • Планиране и внедряване на IPv4 мрежа.
              • Внедряване на Dynamic Host Configuration Protocol (DHCP).
              • Внедряване на IPv6.
              • Внедряване на Domain Name System (DNS).
              • Внедряване и управление на  IP address management (IPAM).
              • Планиране за отдалечен достъп.
              • Внедряване на DirectAccess.
              • Внедряване на virtual private networks (VPNs).
              • Внедряване на мрежови услуги за регионални офиси.
              • Конфигуриране на разширени мрежови услуги.
              • Внедряване на Software Defined Networking.


              Съдържание на курса:


              Module 1: Планиране и внедряване на IPv4 мрежова свързаност

              Настоящият модул разяснява как да се планира и внедри IPv4 адресна схема за нуждите на организацията. Модулът също разяснява и как да се използват фундаменталните мрежови инструменти и техники за конфигуриране, диагностициране и отстраняване на неизправности в IPv4-базирани мрежи.

              Уроци

              • Planning IPv4 addressing
              • Configuring an IPv4 host
              • Managing and troubleshooting IPv4 network connectivity

              Lab : Planning an IPv4 network

              • Planning the IPv4 address assignments

              Lab : Implementing and troubleshooting an IPv4 network

              • Verifying the IPv4 communication
              • Troubleshooting IPv4

              След приключване на модула обучаемите ще могат да:

              • Plan IPv4 addressing.
              • Configure an IPv4 host.
              • Manage and troubleshoot IPv4 network connectivity.

              Module 2: Внедряване на DHCP

              Настоящият модул разяснява как да се планира и внедри DHCP за работа в IPv4 базирана мрежова инфраструктура.

              Уроци

              • Overview of the DHCP server role
              • Deploying DHCP
              • Managing and troubleshooting DHCP

              Lab : Implementing DHCP

              • Planning the DHCP server implementation
              • Implementing the DHCP configuration
              • Validating the DHCP implementation

              След приключване на модула обучаемите ще могат да:

              • Explain the DHCP server role.
              • Deploy DHCP.
              • Manage and troubleshoot DHCP.

              Module 3: Внедряване на IPv6

              Модулът разяснява как да се внедри IPv6, както и как да се интегрират заедно IPv6 и IPv4 мрежи.

              Уроци

              • Overview of IPv6 addressing
              • Configuring an IPv6 host
              • Implementing IPv6 and IPv4 coexistence
              • Transitioning from IPv4 to IPv6

              Lab : Configuring and evaluating IPv6 transition technologies

              • Reviewing the default IPv6 configuration
              • Implementing DHCPv6
              • Configuring network integration by using ISATAP
              • Configuring native IPv6 connectivity
              • Configuring 6to4 connectivity

              След приключване на модула обучаемите ще могат да:

              • Describe the features and benefits of IPv6.
              • Configure an IPv6 host.
              • Implement the coexistence between IPv4 and IPv6 networks.
              • Transition from an IPv4 network to an IPv6 network.

              Module 4: Внедряване на DNS

              Модулът разяснява как да се инсталира, конфигурира и диагностицира за грешки DNS услугата работеща в корпоративна мрежа.

              Уроци

              • Implementing DNS servers
              • Configuring zones in DNS
              • Configuring name resolution between DNS zones
              • Configuring DNS integration with Active Directory Domain Services (AD DS)
              • Configuring advanced DNS settings

              Lab : Planning and implementing name resolution by using DNS

              • Planning DNS name resolution
              • Implementing DNS servers and zones

              Lab : Integrating DNS with AD DS

              • Integrating DNS with AD DS

              Lab : Configuring advanced DNS settings

              • Configuring DNS policies
              • Validating the DNS implementation
              • Troubleshooting DNS

              След приключване на модула обучаемите ще могат да:

              • Implement DNS servers.
              • Configure zones in DNS.
              • Configure name resolution between DNS zones.
              • Configure DNS integration with AD DS.
              • Configure advanced DNS settings.

              Module 5: Внедряване и управление на IPAM

              Модулът разяснява как се внедрява и управлява технологията IPAM в Windows Server 2016. Модулът също разяснява как да се използва IPAM за управление на услуги като  DHCP и DNS.

              Уроци

              • Overview of IPAM
              • Deploying IPAM
              • Managing IP address spaces by using IPAM

              Lab : Implementing IPAM

              • Installing the IPAM Server feature
              • Provisioning the IPAM Server
              • Managing IP address spaces by using IPAM

              След приключване на модула обучаемите ще могат да:

              • Describe the IPAM functionality and components.
              • Deploy IPAM.
              • Manage IP address spaces by using IPAM.

              Module 6: Отдалечен достъп в Windows Server 2016

              Модулът разяснява стъпките при планиране за отдалечен достъп чрез Windows Server 2016 какво и внедряване на Web Application Proxy.

              Уроци

              • Overview of remote access
              • Implementing Web Application Proxy

              Lab : Implementing Web Application Proxy

              • Implementing Web Application Proxy
              • Validating the Web Application Proxy deployment

              След приключване на модула обучаемите ще могат да:

              • Describe remote access.
              • Implement Web Application Proxy.

              Module 7: Внедряване на DirectAccess

              Модулът разявнява внедряване и управление на DirectAccess технологията в Windows Server 2016.

              Уроци

              • Overview of DirectAccess
              • Implementing DirectAccess by using the Getting Started Wizard
              • Implementing and managing an advanced DirectAccess infrastructure

              Lab : Implementing DirectAccess by using the Getting Started Wizard

              • Verifying readiness for a DirectAccess deployment
              • Configuring DirectAccess
              • Validating the DirectAccess deployment

              Lab : Deploying an advanced DirectAccess solution

              • Preparing the environment for DirectAccess
              • Implementing the advanced DirectAccess infrastructure
              • Validating the DirectAccess deployment

              След приключване на модула обучаемите ще могат да:

              • Explain DirectAccess and how it works.
              • Implement DirectAccess by using the Getting Started Wizard.
              • Implement and manage an advanced DirectAccess infrastructure.

              Module 8: Внедряване на VPN

              Модулът разяснява методите за внедряване и управление на отдалечен достъп чрез Windows Server 2016 и използване на VPN технологии.

              Уроци

              • Planning VPNs
              • Implementing VPNs

              Lab : Implementing a VPN

              • Implementing a VPN
              • Validating the VPN deployment
              • Troubleshooting VPN access

              След приключване на модула обучаемите ще могат да:

              • Plan for a VPN solution.
              • Implement VPNs.

              Module 9: Внедряване на мрежова свързаност за отдалечени офиси

              Модулът разяснява технологиите за внедряване на услуги за регионални офиси.

              Уроци

              • Networking features and considerations for branch offices
              • Implementing Distributed File System (DFS) for branch offices
              • Implementing BranchCache for branch offices

              Lab : Implementing DFS for branch offices

              • Implementing DFS
              • Validating the deployment

              Lab : Implementing BranchCache

              • Implementing BranchCache
              • Validating the deployment

              След приключване на модула обучаемите ще могат да:

              • Describe the networking features and considerations for branch offices.
              • Implement DFS for branch offices.
              • Implement BranchCache for branch offices.

              Module 10: Конфигуриране на комплексни мрежови услуги

              Модулът е фокусиран върху внедряване на комплексни морежови инфраструктури.

              Уроци

              • Overview of high performance networking features
              • Configuring advanced Microsoft Hyper-V networking features

              Lab : Configuring advanced Hyper-V networking features

              • Creating and using Hyper-V virtual switches
              • Configuring and using the advanced features of a virtual switch

              След приключване на модула обучаемите ще могат да:

              • Describe the high performance networking enhancements in Windows Server 2016.
              • Configure the advanced Microsoft Hyper-V networking features.

              Module 11: Внедряване на Software Defined Networking

              Настоящият модул е фокурсиран върху внедряване на software defined networking.

              Уроци

              • Overview of Software Defined Networking
              • Implementing network virtualization
              • Implementing Network Controller

              Lab : Deploying Network Controller

              • Preparing to deploy Network Controller
              • Deploying Network Controller

              След приключване на модула обучаемите ще могат да:

              • Describe Software Defined Networking.
              • Implement network virtualization.
              • Implement Network Controller.


              Видео Курс Microsoft 70-741 Networking with Windows Server 2016


              IT-Training Ви гарантира 100% за качеството на този курс. Ако по някаква причина обучението не отговори на очакванията ви, ние ви гарантираме възстановяване на сумата, която сте заплатили.

              Формат на курса: електронен формат, дигитална видео библиотека

              Език на курса: български (английски е наличен като опция)

              Метериали: видео курс

              Лабораторна среда: не е включена в курса.

              цената включва 20 уч.ч. видео записано обучение.


              Метод на плащане: PayPal, банков превод, наложен платеж, брой.

              Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.

              Ако имате въпроси можете да се свържете с нас, чрез меню контакти.

              След потвърждаване на плащането, в рамките на 48 часа ще Ви изпратим достъп до видео библиотеката. Достъпът е неограничен за Вас от всичките Ви устройства. 


              След завършване на курса студентите ще могат да:

              • Планиране и внедряване на IPv4 мрежа.
              • Внедряване на Dynamic Host Configuration Protocol (DHCP).
              • Внедряване на IPv6.
              • Внедряване на Domain Name System (DNS).
              • Внедряване и управление на  IP address management (IPAM).
              • Планиране за отдалечен достъп.
              • Внедряване на DirectAccess.
              • Внедряване на virtual private networks (VPNs).
              • Внедряване на мрежови услуги за регионални офиси.
              • Конфигуриране на разширени мрежови услуги.
              • Внедряване на Software Defined Networking.


              Съдържание на курса:


              Module 1: Планиране и внедряване на IPv4 мрежова свързаност

              Настоящият модул разяснява как да се планира и внедри IPv4 адресна схема за нуждите на организацията. Модулът също разяснява и как да се използват фундаменталните мрежови инструменти и техники за конфигуриране, диагностициране и отстраняване на неизправности в IPv4-базирани мрежи.

              Уроци

              • Planning IPv4 addressing
              • Configuring an IPv4 host
              • Managing and troubleshooting IPv4 network connectivity


              След приключване на модула обучаемите ще могат да:

              • Plan IPv4 addressing.
              • Configure an IPv4 host.
              • Manage and troubleshoot IPv4 network connectivity.

              Module 2: Внедряване на DHCP

              Настоящият модул разяснява как да се планира и внедри DHCP за работа в IPv4 базирана мрежова инфраструктура.

              Уроци

              • Overview of the DHCP server role
              • Deploying DHCP
              • Managing and troubleshooting DHCP


              След приключване на модула обучаемите ще могат да:

              • Explain the DHCP server role.
              • Deploy DHCP.
              • Manage and troubleshoot DHCP.

              Module 3: Внедряване на IPv6

              Модулът разяснява как да се внедри IPv6, както и как да се интегрират заедно IPv6 и IPv4 мрежи.

              Уроци

              • Overview of IPv6 addressing
              • Configuring an IPv6 host
              • Implementing IPv6 and IPv4 coexistence
              • Transitioning from IPv4 to IPv6


              След приключване на модула обучаемите ще могат да:

              • Describe the features and benefits of IPv6.
              • Configure an IPv6 host.
              • Implement the coexistence between IPv4 and IPv6 networks.
              • Transition from an IPv4 network to an IPv6 network.

              Module 4: Внедряване на DNS

              Модулът разяснява как да се инсталира, конфигурира и диагностицира за грешки DNS услугата работеща в корпоративна мрежа.

              Уроци

              • Implementing DNS servers
              • Configuring zones in DNS
              • Configuring name resolution between DNS zones
              • Configuring DNS integration with Active Directory Domain Services (AD DS)
              • Configuring advanced DNS settings


              След приключване на модула обучаемите ще могат да:

              • Implement DNS servers.
              • Configure zones in DNS.
              • Configure name resolution between DNS zones.
              • Configure DNS integration with AD DS.
              • Configure advanced DNS settings.

              Module 5: Внедряване и управление на IPAM

              Модулът разяснява как се внедрява и управлява технологията IPAM в Windows Server 2016. Модулът също разяснява как да се използва IPAM за управление на услуги като  DHCP и DNS.

              Уроци

              • Overview of IPAM
              • Deploying IPAM
              • Managing IP address spaces by using IPAM


              След приключване на модула обучаемите ще могат да:

              • Describe the IPAM functionality and components.
              • Deploy IPAM.
              • Manage IP address spaces by using IPAM.

              Module 6: Отдалечен достъп в Windows Server 2016

              Модулът разяснява стъпките при планиране за отдалечен достъп чрез Windows Server 2016 какво и внедряване на Web Application Proxy.

              Уроци

              • Overview of remote access
              • Implementing Web Application Proxy


              След приключване на модула обучаемите ще могат да:

              • Describe remote access.
              • Implement Web Application Proxy.

              Module 7: Внедряване на DirectAccess

              Модулът разявнява внедряване и управление на DirectAccess технологията в Windows Server 2016.

              Уроци

              • Overview of DirectAccess
              • Implementing DirectAccess by using the Getting Started Wizard
              • Implementing and managing an advanced DirectAccess infrastructure


              След приключване на модула обучаемите ще могат да:

              • Explain DirectAccess and how it works.
              • Implement DirectAccess by using the Getting Started Wizard.
              • Implement and manage an advanced DirectAccess infrastructure.

              Module 8: Внедряване на VPN

              Модулът разяснява методите за внедряване и управление на отдалечен достъп чрез Windows Server 2016 и използване на VPN технологии.

              Уроци

              • Planning VPNs
              • Implementing VPNs


              След приключване на модула обучаемите ще могат да:

              • Plan for a VPN solution.
              • Implement VPNs.

              Module 9: Внедряване на мрежова свързаност за отдалечени офиси

              Модулът разяснява технологиите за внедряване на услуги за регионални офиси.

              Уроци

              • Networking features and considerations for branch offices
              • Implementing Distributed File System (DFS) for branch offices
              • Implementing BranchCache for branch offices


              След приключване на модула обучаемите ще могат да:

              • Describe the networking features and considerations for branch offices.
              • Implement DFS for branch offices.
              • Implement BranchCache for branch offices.

              Module 10: Конфигуриране на комплексни мрежови услуги

              Модулът е фокусиран върху внедряване на комплексни морежови инфраструктури.

              Уроци

              • Overview of high performance networking features
              • Configuring advanced Microsoft Hyper-V networking features


              След приключване на модула обучаемите ще могат да:

              • Describe the high performance networking enhancements in Windows Server 2016.
              • Configure the advanced Microsoft Hyper-V networking features.

              Module 11: Внедряване на Software Defined Networking

              Настоящият модул е фокурсиран върху внедряване на software defined networking.

              Уроци

              • Overview of Software Defined Networking
              • Implementing network virtualization
              • Implementing Network Controller

              След приключване на модула обучаемите ще могат да:

              • Describe Software Defined Networking.
              • Implement network virtualization.
              • Implement Network Controller.

              Видео Курс Linux Professional Institute LPIC-1 102 System Administrator


              IT-Training гарантира 100% удовлетворение от курса. За повече информация прегледайте политиката ни за 100% удовлетворение.

              Формат на курса: видео обучение, електронен формат, достъп до дигитална видео библиотека.

              Цел на курса: Подготовка за сертификат, повишаване на квалификацията.

              Език на курса: български (английски е наличен като опция)

              Метериали: в електронен формат, включени в цената

              Лабораторна среда: може да се заяви като добавка към услугата.

              цената включва 20 уч.ч. онлайн обучение


              Метод на плащане: PayPal, банков превод, наложен платеж, брой.


              Заявка за издаване на фактура се приема към момента на записването на съответния курс.

              Фактура се издава в рамките на 7 дни от потвърждаване на плащането.

              За повече информация използвайте формата за контакт.

              След потвърждаване на плащането, в рамките на 48 часа ще Ви изпратим достъп до видео библиотеката. Достъпът е неограничен за Вас от всичките Ви устройства. 


              Съдържание:

              Topic 105: Shells, Scripting and Data Management

              105.1 Customize and use the shell environment

              Description: Candidates should be able to customize shell environments to meet users’ needs. Candidates should be able to modify global and user profiles.

              Key Knowledge Areas:

              Set environment variables (e.g. PATH) at login or when spawning a new shell

              Write Bash functions for frequently used sequences of commands

              Maintain skeleton directories for new user accounts

              Set command search path with the proper directory

              The following is a partial list of the used files, terms and utilities: source, /etc/bash.bashrc, /etc/profile, env, export, set, unset, ~/.bash_profile, ~/.bash_login, ~/.profile, ~/.bashrc, ~/.bash_logout, function, alias, lists


              105.2 Customize or write simple scripts

              Description: Candidates should be able to customize existing scripts, or write simple new Bash scripts.

              Key Knowledge Areas:

              Use standard sh syntax (loops, tests)

              Use command substitution

              Test return values for success or failure or other information provided by a command

              Perform conditional mailing to the superuser

              Correctly select the script interpreter through the shebang (#!) line

              Manage the location, ownership, execution and suid-rights of scripts

              Terms and Utilities: for, while, test, if, read, seq, exec


              105.3 SQL data management

              Description: Candidates should be able to query databases and manipulate data using basic SQL commands. This objective includes performing queries involving joining of 2 tables and/or subselects.

              Key Knowledge Areas:

              Use of basic SQL commands

              Perform basic data manipulation

              Terms and Utilities: insert, update, select, delete, from, where, group by, order by, join


              Topic 106: User Interfaces and Desktops

              106.1 Install and configure X11

              Description: Candidates should be able to install and configure X11.

              Key Knowledge Areas:

              Verify that the video card and monitor are supported by an X server

              Awareness of the X font server

              Basic understanding and knowledge of the X Window configuration file

              Terms and Utilities: /etc/X11/xorg.conf, xhost, DISPLAY, xwininfo, xdpyinfo, X


              106.2 Setup a display manager

              Description: Candidates should be able to describe the basic features and configuration of the LightDM display manager. This objective covers awareness of the display managers XDM (X Display Manger), GDM (Gnome Display Manager) and KDM (KDE Display Manager).

              Key Knowledge Areas:

              Basic configuration of LightDM

              Turn the display manager on or off

              Change the display manager greeting

              Awareness of XDM, KDM and GDM

              Terms and Utilities: lightdm, /etc/lightdm/


              106.3 Accessibility

              Description: Demonstrate knowledge and awareness of accessibility technologies.

              Key Knowledge Areas:

              Basic knowledge of keyboard accessibility settings (AccessX)

              Basic knowledge of visual settings and themes

              Basic knowledge of assistive technology (ATs)

              Terms and Utilities: Sticky/Repeat Keys, Slow/Bounce/Toggle Keys, Mouse Keys, High Contrast/Large Print Desktop Themes, Screen Reader, Braille Display, Screen Magnifier, On-Screen Keyboard, Gestures (used at login, for example GDM), Orca, GOK, emacspeak


              Topic 107: Administrative Tasks

              107.1 Manage user and group accounts and related system files

              Description: Candidates should be able to add, remove, suspend and change user accounts.

              Key Knowledge Areas:

              Add, modify and remove users and groups

              Manage user/group info in password/group databases

              Create and manage special purpose and limited accounts

              Terms and Utilities: /etc/passwd, /etc/shadow, /etc/group, /etc/skel/, chage, getent, groupadd, groupdel, groupmod, passwd, useradd, userdel, usermod


              107.2 Automate system administration tasks by scheduling jobs

              Description: Candidates should be able to use cron or anacron to run jobs at regular intervals and to use at to run jobs at a specific time.

              Key Knowledge Areas:

              Manage cron and at jobs

              Configure user access to cron and at services

              Configure anacron

              Terms and Utilities: /etc/cron.{d,daily,hourly,monthly,weekly}/, /etc/at.deny, /etc/at.allow, /etc/crontab, /etc/cron.allow, /etc/cron.deny, /var/spool/cron/, crontab, at, atq, atrm, anacron, /etc/anacrontab


              107.3 Localisation and internationalisation

              Description: Candidates should be able to localize a system in a different language than English. As well, an understanding of why LANG=C is useful when scripting.

              Key Knowledge Areas:

              Configure locale settings and environment variables

              Configure timezone settings and environment variables

              Terms and Utilities: /etc/timezone, /etc/localtime

              /usr/share/zoneinfo/

              LC_*

              LC_ALL

              LANG

              TZ

              /usr/bin/locale

              tzselect

              timedatectl

              date

              iconv

              UTF-8

              ISO-8859

              ASCII

              Unicode

              Topic 108: Essential System Services


              108.1 Maintain system time


              Weight: 3


              Description: Candidates should be able to properly maintain the system time and synchronize the clock via NTP.


              Key Knowledge Areas:


              Set the system date and time

              Set the hardware clock to the correct time in UTC

              Configure the correct timezone

              Basic NTP configuration

              Knowledge of using the pool.ntp.org service

              Awareness of the ntpq command

              Terms and Utilities:


              /usr/share/zoneinfo/

              /etc/timezone

              /etc/localtime

              /etc/ntp.conf

              date

              hwclock

              ntpd

              ntpdate

              pool.ntp.org


              108.2 System logging


              Weight: 3


              Description: Candidates should be able to configure the syslog daemon. This objective also includes configuring the logging daemon to send log output to a central log server or accept log output as a central log server. Use of the systemd journal subsystem is covered. Also, awareness of rsyslog and syslog-ng as alternative logging systems is included.


              Key Knowledge Areas:


              Configuration of the syslog daemon

              Understanding of standard facilities, priorities and actions

              Configuration of logrotate

              Awareness of rsyslog and syslog-ng

              Terms and Utilities:


              syslog.conf

              syslogd

              klogd

              /var/log/

              logger

              logrotate

              /etc/logrotate.conf

              /etc/logrotate.d/

              journalctl

              /etc/systemd/journald.conf

              /var/log/journal/


              108.3 Mail Transfer Agent (MTA) basics


              Weight: 3


              Description: Candidates should be aware of the commonly available MTA programs and be able to perform basic forward and alias configuration on a client host. Other configuration files are not covered.


              Key Knowledge Areas:


              Create e-mail aliases

              Configure e-mail forwarding

              Knowledge of commonly available MTA programs (postfix, sendmail, qmail, exim) (no configuration)

              Terms and Utilities:


              ~/.forward

              sendmail emulation layer commands

              newaliases

              mail

              mailq

              postfix

              sendmail

              exim

              qmail

              ~/.forward

              sendmail emulation layer commands

              newaliases


              108.4 Manage printers and printing


              Weight: 2


              Description: Candidates should be able to manage print queues and user print jobs using CUPS and the LPD compatibility interface.


              Key Knowledge Areas:


              Basic CUPS configuration (for local and remote printers)

              Manage user print queues

              Troubleshoot general printing problems

              Add and remove jobs from configured printer queues

              Terms and Utilities:


              CUPS configuration files, tools and utilities

              /etc/cups/

              lpd legacy interface (lpr, lprm, lpq)

              Topic 109: Networking Fundamentals


              109.1 Fundamentals of internet protocols


              Weight: 4


              Description: Candidates should demonstrate a proper understanding of TCP/IP network fundamentals.


              Key Knowledge Areas:


              Demonstrate an understanding of network masks and CIDR notation

              Knowledge of the differences between private and public “dotted quad” IP addresses

              Knowledge about common TCP and UDP ports and services (20, 21, 22, 23, 25, 53, 80, 110, 123, 139, 143, 161, 162, 389, 443, 465, 514, 636, 993, 995)

              Knowledge about the differences and major features of UDP, TCP and ICMP

              Knowledge of the major differences between IPv4 and IPv6

              Knowledge of the basic features of IPv6

              Terms and Utilities:


              /etc/services

              IPv4, IPv6

              Subnetting

              TCP, UDP, ICMP


              109.2 Basic network configuration


              Weight: 4


              Description: Candidates should be able to view, change and verify configuration settings on client hosts.


              Key Knowledge Areas:


              Manually and automatically configure network interfaces

              Basic TCP/IP host configuration

              Setting a default route

              Terms and Utilities:


              /etc/hostname

              /etc/hosts

              /etc/nsswitch.conf

              ifconfig

              ifup

              ifdown

              ip

              route

              ping


              109.3 Basic network troubleshooting


              Weight: 4


              Description: Candidates should be able to troubleshoot networking issues on client hosts.


              Key Knowledge Areas:


              Manually and automatically configure network interfaces and routing tables to include adding, starting, stopping, restarting, deleting or reconfiguring network interfaces

              Change, view, or configure the routing table and correct an improperly set default route manually

              Debug problems associated with the network configuration

              Terms and Utilities:


              ifconfig

              ip

              ifup

              ifdown

              route

              host

              hostname

              dig

              netstat

              ping

              ping6

              traceroute

              traceroute6

              tracepath

              tracepath6

              netcat


              109.4 Configure client side DNS


              Weight: 2


              Description: Candidates should be able to configure DNS on a client host.


              Key Knowledge Areas:


              Query remote DNS servers

              Configure local name resolution and use remote DNS servers

              Modify the order in which name resolution is done

              Terms and Utilities:


              /etc/hosts

              /etc/resolv.conf

              /etc/nsswitch.conf

              host

              dig

              getent

              Topic 110: Security


              110.1 Perform security administration tasks


              Weight: 3


              Description: Candidates should know how to review system configuration to ensure host security in accordance with local security policies.


              Key Knowledge Areas:


              Audit a system to find files with the suid/sgid bit set

              Set or change user passwords and password aging information

              Being able to use nmap and netstat to discover open ports on a system

              Set up limits on user logins, processes and memory usage

              Determine which users have logged in to the system or are currently logged in

              Basic sudo configuration and usage

              Terms and Utilities:


              find

              passwd

              fuser

              lsof

              nmap

              chage

              netstat

              sudo

              /etc/sudoers

              su

              usermod

              ulimit

              who, w, last


              110.2 Setup host security


              Weight: 3


              Description: Candidates should know how to set up a basic level of host security.


              Key Knowledge Areas:


              Awareness of shadow passwords and how they work

              Turn off network services not in use

              Understand the role of TCP wrappers

              Terms and Utilities:


              /etc/nologin

              /etc/passwd

              /etc/shadow

              /etc/xinetd.d/

              /etc/xinetd.conf

              /etc/inetd.d/

              /etc/inetd.conf

              /etc/inittab

              /etc/init.d/

              /etc/hosts.allow

              /etc/hosts.deny


              110.3 Securing data with encryption


              Weight: 3


              Description: The candidate should be able to use public key techniques to secure data and communication.


              Key Knowledge Areas:


              Perform basic OpenSSH 2 client configuration and usage

              Understand the role of OpenSSH 2 server host keys

              Perform basic GnuPG configuration, usage and revocation

              Understand SSH port tunnels (including X11 tunnels)

              Terms and Utilities:


              ssh

              ssh-keygen

              ssh-agent

              ssh-add

              ~/.ssh/id_rsa and id_rsa.pub

              ~/.ssh/id_dsa and id_dsa.pub

              /etc/ssh/ssh_host_rsa_key and ssh_host_rsa_key.pub

              /etc/ssh/ssh_host_dsa_key and ssh_host_dsa_key.pub

              ~/.ssh/authorized_keys

              ssh_known_hosts

              gpg

              ~/.gnupg/


              Видео Курс Linux Foundation Certified System Administrator - LFCS


              IT-Training гарантира 100% удовлетворение от курса. За повече информация прегледайте политиката ни за 100% удовлетворение.

              Формат на курса: видео обучение, електронен формат, достъп до дигитална видео библиотека.

              Цел на курса: Подготовка за сертификат, повишаване на квалификацията.

              Език на курса: български (английски е наличен като опция)

              Метериали: в електронен формат, включени в цената

              Лабораторна среда: може да се заяви като добавка към услугата.

              цената включва 20 уч.ч. онлайн обучение


              Метод на плащане: PayPal, банков превод, наложен платеж, брой.


              Заявка за издаване на фактура се приема към момента на записването на съответния курс.

              Фактура се издава в рамките на 7 дни от потвърждаване на плащането.

              За повече информация използвайте формата за контакт.

              След потвърждаване на плащането, в рамките на 48 часа ще Ви изпратим достъп до видео библиотеката. Достъпът е неограничен за Вас от всичките Ви устройства. 



              Linux е # 1 операционна система за уеб сървъри, изчислителни облаци, смарт телефони и потребителска електроника. Тъй като Linux се разраства толкова бързо, има недостиг на опитни Linux професионалисти. Според доклада на Linux Job за 2015 г., 97% от мениджърите се стремят да добавят Linux талант към екипа си през настоящата година. Има 50,000+ обяви за открити работни места, изискващи Linux умения на dice.com. И хората с Linux умения се наемат с безпрецедентна скорост. Демонстрирайте на работодателите, знанията и уменията които имате върху Linux администрация, с този курс/сертификат за Linux Foundation Certified System Administrator.


              Настоящия курс покрива следните два официални курса на Linux Foundation за подготовка за сертифициране Linux Foundation Certified System Administrator - LFCS


              LFS101

              Introduction to Linux

              1. The Linux Foundation
              2. Linux Philosophy and Concepts
              3. Linux Structure and Installation
              4. Graphical Interface
              5. System Configuration From The Graphical Interface
              6. Finding Linux Documentation
              7. Command Line Operators
              8. File Operations
              9. User Environment
              10. Text Editors
              11. Local Security Principles
              12. Network Operations
              13. Manipulating Text
              14. Printing
              15. Bash Shell Scripting
              16. Advanced Bash Scripting
              17. Processes
              18. Common Applications

              Essentials of System Administration (LFS201)

              Essentials of System Administration

              1. Preface
                • Introduction
                • Relationship to LFS101x
                • Using as LFCS Exam Preparation
                • Course Formatting
                • Read the Documentation
                • Target Platform
                • Command Line vs Graphical Interface
                • Target Linux Distributions
                • Installation: What to Use for this Course
                • Course Timing
                • Lab Exercises
                • Change, Repetition, and Holy Wars
                • The Linux Foundation
                • Linux Foundation Training
                • Labs
              2. System Startup and Shutdown
                • Understanding the Boot Sequence
                • BIOS
                • Boot Loaders
                • Configuration Files in /etc
                • /etc/sysconfig
                • /etc/default
                • Shutting Down and Rebooting
                • Labs
              3. GRUB
                • What is GRUB?
                • Interactive Selections with GRUB at Boot
                • Installing GRUB
                • GRUB Device Nomenclature
                • Customizing the GRUB Configuration File
                • Labs
              4. init: SystemV, Upstart, systemd
                • The init Process
                • Startup Alternatives
                • SysVinit Runlevels
                • SysVinit and /etc/inittab
                • SysVinit Startup Scripts
                • chkconfig
                • service
                • chkconfig and service on Debian-based Systems
                • Upstart
                • Upstart Utilities
                • systemd
                • systemd Configuration Files
                • Systemctl
                • Labs
              5. Linux Filesystem Tree Layout
                • One Big Filesystem
                • Data Distinctions
                • FHS Linux Standard Directory Tree
                • Main Directory Layout
                • The root (/) Directory and Filesystem
                • /bin
                • /boot
                • Other Files and Directories in /boot
                • /dev
                • /etc
                • /home
                • /lib
                • /media
                • /mnt
                • /opt
                • /proc
                • /sys
                • /root
                • /sbin
                • /tmp
                • /usr
                • /var
                • /run
                • Labs
              6. Kernel Services and Configuration
                • Kernel Overview
                • Main Kernel Tasks
                • Kernel Command Line
                • Kernel Boot Parameters
                • sysctl
                • Labs
              7. Kernel Modules
                • Advantages of Kernel Modules
                • Module Utilities
                • Module Loading and Unloading
                • modprobe
                • Some Considerations with Modules
                • modinfo
                • Module Parameters
                • Kernel Module Configuration
                • Labs
              8. Devices and udev
                • Device Nodes
                • Major and Minor Numbers
                • udev
                • udev Components
                • udev and Hotplug
                • The udev Device Manager
                • udev Rule Files
                • Creating udev Rules
                • Some Examples of Rules Files
                • Labs
              9. Partitioning and Formatting Disks
                • Common Disk Types
                • Disk Geometry
                • Partitioning
                • Why partition?
                • Partition Table
                • Naming Disk Devices and Nodes
                • More on SCSI Device Names
                • blkid and lsblk
                • Sizing up partitions
                • Backing up and Restoring Partition Tables
                • Partition table editors
                • Using fdisk
                • Labs
              10. Encrypting Disks
                • Why Use Encryption?
                • LUKS
                • cryptsetup
                • Using an Encrypted Partition
                • Mounting at Boot
                • Labs
              11. Linux Filesystems and the VFS
                • Filesystem Basics
                • Filesystem Tree Organization
                • Virtual File System (VFS)
                • Available Filesystems
                • Journalling Filesystems
                • Current Filesystem Types
                • Special Filesystems
                • Labs
              12. Filesystem Features: Attributes, Creating, Checking, Mounting
                • Inodes
                • Directory Files
                • Extended Attributes and lsattr/chattr
                • Creating and Formatting Filesystems
                • Checking and Fixing Filesystems
                • Mounting and Unmounting Filesystems
                • mount
                • mount Options
                • umount
                • Mounting Filesystems at Boot
                • Listing Currently Mounted Filesystems
                • Labs
              13. Filesystem Features: Swap, Quotas, Usage
                • Swap
                • Quotas
                • Setting up Quotas
                • quotacheck
                • Turning quotas on and off
                • Examining Quotas
                • Setting quotas
                • Filesystem Usage
                • Disk Space Usage
                • Labs
              14. The Ext2/Ext3/Ext4 Filesystems
                • Ext4 History and Basics
                • Ext4 Features
                • Ext4 Layout
                • Block Groups
                • dumpe2fs
                • tune2fs
                • Superblock Information
                • Data Blocks and Inodes
                • Ext4 Filesystem Enhancements
                • Labs
              15. The XFS and btrfs Filesystems
                • XFS Features
                • XFS Filesystem Maintenance
                • The btrfs Filesystem
                • Labs
              16. Logical Volume Management (LVM)
                • LVM
                • LVM and RAID
                • Volumes and Volume Groups
                • Logical Volumes Utilities
                • Creating Logical Volumes
                • Displaying Logical Volumes
                • Resizing Logical Volumes
                • Examples of Resizing
                • LVM Snapshots
                • Labs
              17. RAID
                • RAID
                • RAID Levels
                • Software RAID Configuration
                • Monitoring RAIDs
                • RAID Hot Spares
                • Labs
              18. Local System Security
                • Local System Security
                • Creating a Security Policy
                • What to Include in the Policy
                • What Risks to Assess
                • Choosing a Security Philosophy
                • Some General Security Guidelines
                • Updates and Security
                • Hardware Accessibility and Vulnerability
                • Hardware Access Guidelines
                • Protection of BIOS
                • Protecting the Boot Loader with Passwords
                • Filesystem Security: mount Options
                • setuid and setgid
                • Setting the setuid/setgid Bits
                • Labs
              19. Linux Security Modules
                • What are Linux Security Modules?
                • LSM Choices
                • SELinux Overview
                • SELinux Modes
                • SELinux Policies
                • Context Utilities
                • SELinux and Standard Command Line Tools
                • SELinux Context Inheritance and Preservation
                • restorecon
                • semanage fcontext
                • Using SELinux Booleans
                • getsebool and setsebool
                • Troubleshooting Tools
                • Additional Online Resources
                • AppArmor
                • Labs
              20. Processes
                • Processes, Programs and Threads
                • The init Process
                • Processes
                • Process Attributes
                • Controlling Processes with ulimit
                • Process Permissions and setuid
                • Process States
                • Execution Modes
                • User Mode
                • System Mode
                • Daemons
                • Kernel-Created Processes
                • Process Creating and Forking
                • Creating Processes in a Command Shell
                • Using nice to Set Priorities
                • Modifying the Nice Value
                • Labs
              21. Signals
                • What are Signals?
                • Types of Signals
                • kill
                • killall and pkill
                • Labs
              22. System Monitoring
                • Available Monitoring Tools
                • The /proc and /sys Pseudo-filesystems
                • /proc Basics
                • A Survey of /proc
                • /proc/sys
                • /sys Basics
                • A Survey of /sys
                • sar
                • Labs
              23. Process Monitoring
                • Monitoring Tools
                • Viewing Process States with ps
                • BSD Option Format for ps
                • ps Output Fields
                • UNIX Option Format for ps
                • Customizing the ps Output
                • Using pstree
                • Viewing System Loads with top
                • top Options
                • Labs
              24. I/O Monitoring and Tuning
                • Disk Bottlenecks
                • iostat
                • iostat Options
                • iostat Extended Options
                • iotop
                • Using ionice to Set I/O Priorities
                • Labs
              25. I/O Scheduling
                • I/O Scheduling
                • I/O Scheduler Choices
                • I/O Scheduling and SSD Devices
                • Tunables and Switching The I/O Scheduler at Run Time
                • CFQ (Completely Fair Queue Scheduler)
                • CFQ Tunables
                • Deadline Scheduler
                • Deadline Tunables
                • Labs
              26. Memory: Monitoring Usage and Tuning
                • Memory Tuning Considerations
                • Memory Monitoring Tools
                • /proc/sys/vm
                • vmstat
                • /proc/meminfo
                • OOM Killer
                • Labs
              27. Package Management Systems
                • Software Packaging Concepts
                • Why Use Packages?
                • Packages Types
                • Available Package Management Systems
                • Packaging Tool Levels and Varieties
                • Package Sources
                • Creating Software Packages
                • Labs
              28. RPM
                • RPM
                • Advantages of Using RPM
                • Package File Names
                • Database Directory
                • Helper Programs and Modifying Settings
                • Queries
                • Verifying Packages
                • Installing Packages
                • Uninstalling Packages
                • Upgrading Packages
                • Freshening Packages
                • Upgrading the Kernel
                • Using rpm2cpio
                • Labs
              29. DPKG
                • DPKG Essentials
                • Package File Names
                • Source Packages
                • DPKG Queries
                • Installing/Upgrading/Uninstalling Packages
                • Labs
              30. yum
                • Package Installers
                • What Is yum?
                • Configuring yum to Use Repositories
                • Repository Files
                • Queries
                • Verifying Packages
                • Installing/Removing/Upgrading Packages
                • Additional Commands
                • Labs
              31. zypper
                • What Is zypper?
                • zypper Queries
                • Installing/Removing/Upgrading
                • Additional zypper Commands
                • Labs
              32. APT
                • What Is APT?
                • apt-get
                • Queries Using apt-cache
                • Installing/Removing/Upgrading
                • Labs
              33. User Account Management
                • User Accounts
                • Attributes of a User Account
                • Creating User Accounts with useradd
                • Modifying and Deleting User Accounts
                • Locked Accounts
                • User IDs and /etc/passwd
                • /etc/shadow
                • Why Use /etc/shadow?
                • Password Management
                • chage: Password Aging
                • Restricted shell
                • Restricted Accounts
                • The root Account
                • SSH
                • ssh Configuration Files
                • Labs
              34. Group Management
                • Groups
                • Group Management
                • User Private Groups
                • Group Membership
                • Labs
              35. File Permissions and Ownership
                • Owner, Group and World
                • File Access Rights
                • File Permissions and Security and Authentication
                • Changing permissions: chmod
                • chmod: Numerical Syntax for Permissions
                • Changing User and Group File Ownership: chown and chgrp
                • umask
                • Filesystem ACLs
                • Getting and Setting ACLs
                • Labs
              36. Pluggable Authentication Modules (PAM)
                • PAM: A Unified Approach to Authentication
                • Authentication Process
                • PAM Configuration Files
                • PAM Rules
                • LDAP Authentication
                • Labs
              37. Backup and Recovery Methods
                • Why Backups?
                • What Needs Backup?
                • Tape Drives
                • Backup Methods
                • Backup Strategies
                • Backup Utilities
                • cpio
                • Using tar for Backups
                • Using tar for Restoring Files
                • Incremental Backups with tar
                • Compression: gzip, bzip2 and xz and Backups
                • dd
                • dd Examples
                • rsync
                • dump and restore
                • dump Options
                • Level 0 backup with dump
                • restore
                • mt
                • Backup Programs
                • Labs
              38. Network Addresses
                • IP Addresses
                • IPv4 Address Types
                • Special Addresses
                • IPv6 Address Types
                • IPv4 Address Classes
                • Netmasks
                • Hostname
                • Getting and Setting the Hostname
                • Labs
              39. Network Devices and Configuration
                • Network Devices
                • Problems with Network Device Names
                • Predictable Network Interface Device Names
                • Examples of the New Naming Scheme
                • NIC Configuration Files
                • ifconfig
                • The ip Utility
                • Examples of Using ip
                • Routing
                • Default Route
                • Static Routes
                • Name Resolution
                • /etc/hosts
                • DNS
                • Network Diagnostic Utilities
                • Labs
              40. Firewalls
                • What is a Firewall
                • Firewall Interfaces and Tools
                • firewalld
                • firewalld Service Status
                • Zones
                • Zone Management
                • Source Management
                • Service and Port Management
                • Labs
              41. Basic Troubleshooting
                • Troubleshooting Overview
                • Basic Techniques
                • Intuition and Experience
                • Things to Check: Networking
                • Things to Check: File Integrity
                • Boot Process Failures
                • Filesystem Corruption and Recovery
                • Using Rescue/Recovery Media
                • Common Utilities on Rescue/Recovery Disks
                • Using Rescue/Recovery Media
                • Labs
              42. System Rescue
                • Emergency Boot Media
                • Using Rescue Media
                • Rescue USB Key
                • Emergency Mode
                • Single User Mode
                • Labs

              Език на курса: български (английски е наличен като опция)

              Метериали: в електронен формат, включени в цената

              Лабораторна среда: не е включена в курса.

              цената включва 20 ч. онлайн обучение (теория).


              Метод на плащане: PayPal, банков превод, наложен платеж.

              За повече информация, моля използвайте формата за контакт.

              След потвърждаване на плащането, в рамките на 48 часа ще Ви изпратим достъп до видео библиотеката. Достъпът е неограничен за Вас от всичките Ви устройства. 


              Objectives:  By the end of the course, you should be able to meet the following objectives:
              •  Describe the software-defined data center 
              •  Deploy an ESXi host and create virtual machines 
              •  Describe the VMware vCenter Server™ architecture 
              •  Deploy a vCenter Server instance or VMware vCenter™ Server Appliance™ 
              •  Use vCenter Server to manage an ESXi host 
              •  Configure and manage vSphere infrastructure with VMware vSphere® Client™ and VMware vSphere® 
                 Web Client 
              •  Configure virtual networks with vSphere standard switches 
              •  Use vCenter Server to manage various types of host storage: VMware vSphere® VMFS, NFS, VMware 
                 Virtual SAN™, and VMware vSphere® Virtual Volumes™ 
              •  Manage virtual machines, templates, clones, and snapshots 
              •  Create a vApp 
              •  Describe and use the content library 
              •  Migrate virtual machines with VMware vSphere® vMotion® 
              •  Use VMware vSphere® Storage vMotion® to migrate virtual machine storage 
              •  Monitor resource usage and manage resource pools 
              •  Use VMware vRealize® Operations Manager™ to identify and solve issues through analytics and alerts 
              •  Manage VMware vSphere® High Availability and VMware vSphere® Fault Tolerance 
              •  Use VMware vSphere® Replication™ and VMware vSphere® Data Protection™ to replicate virtual 
                 machines and perform data recovery 
              •  Use VMware vSphere® Distributed Resource Scheduler™ clusters to improve host scalability 
              •  Use VMware vSphere® Update Manager™ to apply patches and perform basic troubleshooting of ESXi 
                 hosts, virtual machines, and vCenter Server operations
              •  Manage role-based access to the VMware® virtual infrastructure
              •  Use host profiles to manage ESXi configuration compliance and large-scale deployment
              •  Use vSphere distributed switches to scale networking
              •  Use VMware vSphere ® Network I/O Control to ensure network service availability
              •  Use VMware vSphere® Storage I/O Control to ensure storage availability
              •  Use policy-driven storage and VMware vSphere® Storage DRS™ to scale storage
              •  Use VMware vSphere® ESXi™ Image Builder CLI to create an ESXi image and use that image with 
                 VMware vSphere® Auto Deploy™ to provision ESXi host Intended Audience:  Administrators with foundational knowledge of virtualization along with experienced system administrators, systems engineers, and system integrators willing to work hard to achieve superior vSphere skills with minimal time away from the office Prerequisites:  •  System administration experience on Microsoft Windows or Linux operating systems
              •  Understanding of concepts presented in the VMware Data Center Virtualization Fundamentals course or 
                 VCA-DCV certification
              •  Hands-on experience with vSphere Outline:  

              1. Course Introduction
                • Introductions and course logistics
                • Course objectives
                • References and resources

              2. Software-Defined Data Center
                • Introduce components of the software-defined data center
                • Describe where vSphere fits into the cloud architecture
                • Install and use vSphere Client
                • Overview of ESXi

              3. Creating Virtual Machines
                • Introduce virtual machines, virtual machine hardware, and virtual machine files
                • Deploy a single virtual machine

              4. vCenter Server
                • Introduce the vCenter Server architecture
                • Deploy and configure vCenter Server Appliance
                • Use vSphere Web Client
                • Manage vCenter Server inventory objects and licenses

              5. Configuring and Managing Virtual Networks
                • Describe, create, and manage a standard switch
                • Describe and modify standard switch properties
                • Describe the NIC teaming of a standard switch port group

              6. Configuring and Managing Virtual Storage
                • Introduce storage protocols and device names
                • Configure ESXi with iSCSI and NFS storage
                • Create and manage VMFS datastores
                • Introduce Virtual SAN datastores
                • Introduce Virtual Volumes

              7. Virtual Machine Management
                • Use templates and cloning to deploy virtual machines
                • Modify and manage virtual machines
                • Create and manage virtual machine snapshots
                • Perform vSphere vMotion and vSphere Storage vMotion migrations
                • Create VMware vSphere® vApp(s)™
                • Introduce content libraries

              8. Access and Authentication Control
                • Control user access through roles and permissions
                • Discuss ESXi host access and authentication
                • Integrate ESXi with Active Directory

              9. Resource Management and Monitoring
                • Introduce virtual CPU and memory concepts
                • Describe methods for optimizing CPU and memory usage
                • Configure and manage resource pools
                • Use vCenter Server performance graphs and alarms to monitor resource usage

              10. vSphere HA and vSphere Fault Tolerance
                • Explain the vSphere HA architecture
                • Configure and manage a vSphere HA cluster
                • Use vSphere HA advanced parameters
                • Introduce vSphere Fault Tolerance
                • Enable vSphere Fault Tolerance on virtual machines
                • Introduce VMware vSphere® Replication™
                • Use vSphere Data Protection to back up and restore data

              11. Network Scalability
                • Create, configure, and manage vSphere distributed switches, network connections, and port groups
                • Discuss distributed switch features, such as private VLANs, discovery protocols, Network I/O Control, NetFlow, and port mirroring

              12. Host Scalability
                • Use host profiles to manage ESXi configuration compliance
                • Configure and manage a vSphere DRS cluster
                • Configure Enhanced vMotion Compatibility
                • Use vSphere HA and vSphere DRS together

              13. Storage Scalability
                • Describe VMware vSphere® Storage APIs - Array Integration and VMware vSphere® API for Storage Awareness™
                • Explain policy-driven storage
                • Add a storage policy to a virtual machine storage profile
                • Introduce vSphere Storage I/O Control
                • Create a datastore cluster
                • Configure vSphere Storage DRS

              14. Patch Management
                • Use vSphere Update Manager to manage ESXi patching
                • Install vSphere Update Manager and the vSphere Update Manager plug-in
                • Create patch baselines
                • Scan and remediate hosts

              15. VMware Management Resources
                • Describe VMware vSphere® Management Assistant
                • Configure vSphere Management Assistant
                • Discuss the VMware vSphere® Command-Line Interface command set
                • Perform command-line operations for host management, network management, storage management, and performance monitoring

              16. Installing VMware Components
                • Describe vCenter Linked Mode to manage multiple vCenter Server inventories
                • Introduce ESXi installation
                • Describe boot-from-SAN requirements
                • Describe vCenter Server hardware, software, and database requirements
                • Install vCenter Server (Windows-based)

              17. Host and Management Scalability
                • Configure and manage VMware vSphere® Distributed Power Management™
                • Use vSphere ESXi Image Builder CLI to create an ESXi installation image
                • Use vSphere Auto Deploy to deploy a stateless ESXi host

              Видео Курс Cisco CCNA Routing and Switching 200-105 ICND2 Interconnecting Cisco Networking Devices Part 2

              IT-Training Ви гарантира 100% за качеството на този курс. Ако по някаква причина обучението не отговори на очакванията ви, ние ви гарантираме възстановяване на сумата, която сте заплатили.

              Формат на курса: електронен формат, дигитална видео библиотека

              Език на курса: български (английски е наличен като опция)

              Метериали: видео курс

              Лабораторна среда: не е включена в курса.

              цената включва 20 уч.ч. видео обучение.

              Метод на плащане: PayPal, банков превод, пощенски запис


              За повече информация моля използвайте формата за контакт.

              След потвърждаване на плащането, в рамките на 48 часа ще Ви изпратим достъп до видео библиотеката. Достъпът е неограничен за Вас от всичките Ви устройства. 


              Prerequisites


              Before taking the ICND2 course, learners should be familiar with:


              Understanding network fundamentals

              Implementing local area networks

              Implementing Internet connectivity

              Managing network devices

              Securing network devices

              Implementing basic IPv6 connectivity

              Course Content


              This course will students with the knowledge and skills needed to install, configure, operate, and troubleshoot a small enterprise network. It will ensure that students understand and are ready to deploy the latest shifts in technologies and solutions as follows: • understanding of Quality of Service (QoS) elements and their applicability • how virtualized and cloud services will interact and impact enterprise networks • an overview of network programmability and the related controller types and tools that are available to support software defined network architectures A full suite of labs have been developed using the virtual IOS environment with flexible topologies that reinforce concepts with hands-on, guided discovery and challenge labs that align to each lesson module. Upon completing this course, you will be able to meet these objectives:


              Operate a medium-sized LAN with multiple switches supporting VLANs, trunking, switch stacking, chassis aggregation and spanning tree protocols

              Troubleshoot IP connectivity

              Configure and troubleshoot EIGRP and OSPF in IPv4 and IPv6 environments

              Define characteristics, functions and components of a WAN

              Describe SNMP, Syslog, and manage Cisco device configurations, IOS images and licenses

              Understand QoS, virtualization and cloud services, and network programmability related to WAN, access and core segments.


              Course Outline

              Module 1: Implement Scalable Medium-Sized Networks

              Module 2: Troubleshooting Basic Connectivity

              Module 3: Implementing an EIGRP-Based Solution

              Module 4: Summary Challenge

              Module 5: Implement a Scalable OSPF-Based Solution

              Module 6: Wide-Area Networks

              Module 7: Network Device Management and Security

              Module 8: Summary Challenge



              Видео Курс Microsoft 70-742 Identity with Windows Server 2016


              IT-Training Ви гарантира 100% за качеството на този курс. Ако по някаква причина обучението не отговори на очакванията ви, ние ви гарантираме възстановяване на сумата, която сте заплатили.

              Формат на курса: електронен формат, дигитална видео библиотека

              Език на курса: български (английски е наличен като опция)

              Метериали: видео курс

              Лабораторна среда: не е включена в курса.

              цената включва 20 уч.ч. видео записано обучение.


              Метод на плащане: PayPal, банков превод, наложен платеж, брой.

              Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.

              Ако имате въпроси можете да се свържете с нас, чрез меню контакти.

              След потвърждаване на плащането, в рамките на 48 часа ще Ви изпратим достъп до видео библиотеката. Достъпът е неограничен за Вас от всичките Ви устройства. 


              Course Outline

              Module 1: Installing and configuring domain controllers

              This module describes the features of AD DS and how to install domain controllers (DCs). It also covers the considerations for deploying DCs.

              Lessons

              • Overview of AD DS
              • Overview of AD DS domain controllers
              • Deploying a domain controller


              After completing this module, students will be able to:

              • Describe AD DS and its main components.
              • Describe the purpose and roles of domain controllers.
              • Describe the considerations for deploying domain controllers.

              Module 2: Managing objects in AD DS

              This module describes how to use various techniques to manage objects in AD DS. This includes creating and configuring user, group, and computer objects.

              Lessons

              • Managing user accounts
              • Managing groups in AD DS
              • Managing computer objects in AD DS
              • Using Windows PowerShell for AD DS administration
              • Implementing and managing OUs


              After completing this module, students will be able to:

              • Manage user accounts in AD DS.
              • Manage groups in AD DS.
              • Manage computer objects in AD DS.
              • Use Windows PowerShell for AD DS administration.
              • Implement and manage OUs.
              • Administer AD DS.

              Module 3: Advanced AD DS infrastructure management

              This module describes how to plan and implement an AD DS deployment that includes multiple domains and forests. The module provides an overview of the components in an advanced AD DS deployment, the process of implementing a distributed AD DS environment, and the procedure for configuring AD DS trusts.

              Lessons

              • Overview of advanced AD DS deployments
              • Deploying a distributed AD DS environment
              • Configuring AD DS trusts

              After completing this module, students will be able to:

              • Describe the components of an advanced AD DS deployment.
              • Deploy a distributed AD DS environment..
              • Configure AD DS trusts.

              Module 4: Implementing and administering AD DS sites and replication

              This module describes how to plan and implement an AD DS deployment that includes multiple locations. The module explains how replication works in a Windows Server 2016 AD DS environment.

              Lessons

              • Overview of AD DS replication
              • Configuring AD DS sites
              • Configuring and monitoring AD DS replication


              After completing this module, students will be able to:

              • Describe how AD DS replication works.
              • Configure AD DS sites to help optimize authentication and replication traffic.
              • Configure and monitor AD DS replication.


              Module 5: Implementing Group Policy

              This module describes how to implement a GPO infrastructure. The module provides an overview of the components and technologies that compose the Group Policy framework.

              Lessons

              Introducing Group Policy

              Implementing and administering GPOs

              Group Policy scope and Group Policy processing

              Troubleshooting the application of GPOs

              After completing this module, students will be able to:

              Explain what Group Policy is.

              Implement and administer GPOs.

              Describe Group Policy scope and Group Policy processing.

              Troubleshoot GPO application.


              Module 6: Managing user settings with Group Policy

              This module describes how to configure Group Policy settings and Group Policy preferences. This includes implementing administrative templates, configuring folder redirection and scripts, and configuring Group Policy preferences.

              Lessons

              Implementing administrative templates

              Configuring Folder Redirection, software installation, and scripts

              Configuring Group Policy preferences

              After completing this module, students will be able to:

              Implement administrative templates.

              Configure Folder Redirection, software installation, and scripts.

              Configure Group Policy preferences.


              Module 7: Securing Active Directory Domain Services

              This module describes how to configure domain controller security, account security, password security, and Group Managed Service Accounts (gMSA).

              Lessons

              Securing domain controllers

              Implementing account security

              Implementing audit authentication

              Configuring managed service accounts

              After completing this module, students will be able to:

              Secure domain controllers.

              Implement account security.

              Implement audit authentication.

              Configure managed service accounts (MSAs).


              Module 8: Deploying and managing AD CS

              This module describes how to implement an AD CS deployment. This includes deploying, administering, and troubleshooting CAs.

              Lessons

              Deploying CAs

              Administering CAs

              Troubleshooting and maintaining CAs

              After completing this module, students will be able to:

              Deploy CAs.

              Administer CAs.

              Troubleshoot and maintain CAs.


              Module 9: Deploying and managing certificates

              This module describes how to deploy and manage certificates in an AD DS environment. This involves deploying and managing certificate templates, managing certificate revocation and recovery, using certificates in a business environment, and implementing smart cards.

              Lessons

              Deploying and managing certificate templates

              Managing certificate deployment, revocation, and recovery

              Using certificates in a business environment

              Implementing and managing smart cards

              After completing this module, students will be able to:

              Deploy and manage certificate templates.

              Manage certificates deployment, revocation, and recovery.

              Use certificates in a business environment.

              Implement and manage smart cards


              Module 10: Implementing and administering AD FS

              This module describes AD FS and how to configure AD FS in a single-organization scenario and in a partner-organization scenario.

              Lessons

              Overview of AD FS

              AD FS requirements and planning

              Deploying and configuring AD FS

              Overview of Web Application Proxy

              After completing this module, students will be able to:

              Describe AD FS.

              Explain how to deploy AD FS.

              Explain how to implement AD FS for a single organization.

              Explain how to extend AD FS to external clients.

              Implement single sign-on (SSO) to support online services.


              Module 11: Implementing and administering AD RMS

              This module describes how to implement an AD RMS deployment. The module provides an overview of AD RMS, explains how to deploy and manage an AD RMS infrastructure, and explains how to configure AD RMS content protection.

              Lessons

              Overview of AD RMS

              Deploying and managing an AD RMS infrastructure

              Configuring AD RMS content protection

              After completing this module, students will be able to:

              Describe AD RMS.

              Deploy and manage an AD RMS infrastructure. .

              Configure AD RMS content protection.


              Module 12: Implementing AD DS synchronization with Microsoft Azure AD

              This module describes how to plan and configure directory syncing between Microsoft Azure Active Directory (Azure AD) and on-premises AD DS. The modules describes various sync scenarios, such as Azure AD sync, AD FS and Azure AD, and Azure AD Connect.

              Lessons

              Planning and preparing for directory synchronization

              Implementing directory synchronization by using Azure AD Connect

              Managing identities with directory synchronization

              After completing this module, students will be able to:

              Plan and prepare for directory synchronization.

              Implement directory synchronization by using Microsoft Azure Active Directory Connect (Azure AD Connect).

              Manage identities with directory synchronization.


              Module 13: Monitoring, managing, and recovering AD DS

              This module describes how to monitor, manage, and maintain AD DS to help achieve high availability of AD DS.

              Lessons

              Monitoring AD DS

              Managing the Active Directory database

              Active Directory backup and recovery options for AD DS and other identity and access solutions

              After completing this module, students will be able to:

              Monitor AD DS.

              Manage the Active Directory database.

              Describe the backup and recovery options for AD DS and other identity access solutions.


              Видео Курс Microsoft 70-740 Installing Windows Server 2016

              IT-Training гарантира 100% удовлетворение от курса.  За повече информация прегледайте политиката ни за 100% удовлетворение.

              Формат на курса: електронен формат, дигитална видео библиотека

              Език на курса: български (английски е наличен като опция)

              Метериали: видео курс

              Лабораторна среда: не е включена в курса.

              цената включва 20 уч.ч. видео записано обучение.

              Допълнителна информация за съдържанието на курса можете на откриете на нашият сайт - http://www.it-training.pro


              След потвърждаване на плащането, в рамките на 48 часа ще Ви изпратим достъп до видео библиотеката. Достъпът е неограничен за Вас от всичките Ви устройства. 


              Умения след видео курса:

              Prepare and install Nano Server, a Server Core installation, and plan a server upgrade and migration strategy.

              Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes.

              Describe enterprise storage solutions, and select the appropriate solution for a given situation.

              Implement and manage Storage Spaces and Data Deduplication.

              Install and configure Microsoft Hyper-V.

              Deploy, configure, and manage Windows and Hyper-V containers.

              Describe the high availability and disaster recovery technologies in Windows Server 2016.

              Plan, create, and manage a failover cluster.

              Implement failover clustering for Hyper-V virtual machines.

              Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation.

              Create and manage deployment images.

              Manage, monitor, and maintain virtual machine installations.


              Съдържание на курса

              Module 1: Installing, upgrading, and migrating servers and workloads

              This module explains how to prepare and install Nano Server and Server Core. This module also explains how to upgrade and migrate server roles and workloads. Finally, this module explains how to choose an activation model based on your environment characteristics.

              Lessons

              Introducing Windows Server 2016

              Preparing and installing Nano Server and Server Core

              Preparing for upgrades and migrations

              Migrating server roles and workloads

              Windows Server activation models


              Module 2: Configuring local storage

              This module explains how to manage disks and volumes in Windows Server 2016.

              Lessons

              Managing disks in Windows Server 2016

              Managing volumes in Windows Server 2016


              Module 3: Implementing enterprise storage solutions

              This module describes the direct-attached storage (DAS), network-attached storage (NAS), and storage area networks (SANs). It also helps you understand Microsoft Internet Storage Name Service (iSNS) Server, data center bridging, and Multipath I/O (MPIO). Additionally, this module also compares Fibre Channel, Internet Small Computer System Interface (iSCSI), and Fibre Channel Over Ethernet (FCoE), and describes how to configure sharing in Windows Server 2016.

              Lessons

              Overview of direct-attached storage, network-attached storage, and storage area networks

              Comparing Fibre Channel, iSCSI, and FCoE

              Understanding iSNS, data centre bridging, and MPIO

              Configuring sharing in Windows Server 2016


              Module 4: Implementing Storage Spaces and Data Deduplication

              This module explains how to implement and manage Storage Spaces. This module also explains how to implement Data Deduplication.

              Lessons

              Implementing Storage Spaces

              Managing Storage Spaces

              Implementing Data Deduplication


              Module 5: Installing and configuring Hyper-V and virtual machines

              This module provides an overview of Hyper-V. This module also explains how to configure, manage, and install Hyper-V.

              Lessons

              Overview of Hyper-V

              Installing Hyper-V

              Configuring storage on Hyper-V host servers

              Configuring networking on Hyper-V host servers

              Configuring Hyper-V virtual machines

              Managing Hyper-V virtual machines


              Module 6: Deploying and managing Windows Server and Hyper-V containers

              This module provides and overview of containers in Windows Server 2016. It also explains how to deploy, install, configure, and manage containers in Windows Server 2016.

              Lessons

              Overview of containers in Windows Server 2016

              Deploying Windows Server and Hyper-V containers

              Installing, configuring, and managing containers


              Module 7: Overview of high availability and disaster recovery

              This module provides an overview of high availability, business continuity, and disaster recovery. It further explains how to plan high availability and disaster recovery solutions. Additionally, in this module you will know how to back up and restore the Windows Server 2016 operating system and data by using Windows Server Backup. Finally, you will learn about Windows Server 2016 high availability with failover clustering.

              Lessons

              Defining levels of availability

              Planning high availability and disaster recovery solutions with Hyper-V virtual machines

              Backing up and restoring the Windows Server 2016 operating system and data by using Windows Server B

              High availability with failover clustering in Windows Server 2016


              Module 8: Implementing and managing failover clustering

              This module explains how to plan, create, configure, maintain, and troubleshoot a failover cluster. This module also explains how to implement site high availability with stretch clustering.

              Lessons

              Planning a failover cluster

              Creating and configuring a new failover cluster

              Maintaining a failover cluster

              Troubleshooting a failover cluster

              Implementing site high availability with stretch clustering


              Module 9: Implementing failover clustering for Hyper-V virtual machines

              This module describes integrating Hyper-V virtual machines in a clustered environment. It also explains how to implement and maintain Hyper-V virtual machines on failover clusters. Additionally, this module also explains how to configure network health protection.

              Lessons

              Overview of integrating Hyper-V in Windows Server 2016 with failover clustering

              Implementing and maintaining Hyper-V virtual machines on failover clusters

              Key features for virtual machines in a clustered environment


              Module 10: Implementing Network Load Balancing

              This module provides an overview of NLB clusters. It also explains how to plan and configure an NLB cluster implementation.

              Lessons

              Overview of NLB clusters

              Configuring an NLB cluster

              Planning an NLB implementation


              Module 11: Creating and managing deployment images

              This module provides an introduction to deployment images. It also explains how to create and manage deployment images by using the Microsoft Deployment Toolkit (MDT). Additionally, it explains how to evaluate an organization’s requirements for server virtualization.

              Lessons

              Introduction to deployment images

              Creating and managing deployment images by using MDT

              Virtual machine environments for different workloads


              Module 12: Managing, monitoring, and maintaining virtual machine installations

              This module provides an overview on WSUS and explains the deployment options. It explains how to update management process with WSUS and also how to use Performance Monitor. Additionally, this module also provides an overview of PowerShell Desired State Configuration (DSC) and Windows Server 2016 monitoring tools. Finally, this module describes how to use Performance Monitor and monitor Event Logs.

              Lessons

              WSUS overview and deployment options

              Update management process with WSUS

              Overview of PowerShell DSC

              Overview of Windows Server 2016 monitoring tools

              Using Performance Monitor

              Monitoring Event Logs


              Официален Cisco курс - Курсът е съгласно програмата на Cisco Systems и основната му цел е подготовка за сертифициране за CCNA Routing and Switching, както и за повишаване на професионалните умения и квалификация.

              Формат на курса: Онлайн, провежда се в реално време от сертифициран инструктор във виртуална класна стая.

              Език на курса: български (английски е наличен като опция).

              Метериали: в електронен формат, включени в цената.

              Пакет от услуги включени към курса:

              • онлайн обучение
              • сертификат за завършен курс
              • достъп до виртуален лаб
              • книги и учебни материали
              • достъп до примерни онлайн тестове
              • видео библиотека към курса - достъп до видео записи на сесиите към курса

              Курсът е подходящ за: начинаещи в мрежовите технологии или мрежовата администрация; желаещи да се сертифицират за CCNA Routing and Switching; желаещи да научат мрежови технологии базирани на Cisco Systems продуки и устройства и да повишат професионалната си квалификация.

              Интерактивен формат: участниците имат възможност да участват в дискусии, да задават въпроси, двупосочна връзка с интруктора в реално време, чрез виртуалната класна стая. Онлайн формата се провежда в реално време по график, участниците са свързани наживо, за разлика от видео курсовете при онлайн формата не се презентира видео запис.

              График: изберете удобен за вас график от падащото меню.  Курсът се провежда в удобно и съобразено с участниците време.

              Лабораторна среда: всеки курсист разполага със собствена лаб среда, където се провеждат упражненията, част от курса.

              Примерни тестове: позволяват да проверите подготовката си за  сертификационен изпит с примерни въпроси.

              Продължителност на курса: 40 уч.ч. онлайн обучение (теория и практика).

              Видео библиотека: Можете да преглеждате отново  и по всяко време записите на всички сесии към курса. 

              Сертификат: всички участници получават сертификат за завършен курс.

              При отказ от достъп до лаб среда се предоставя отстъпка.

              Метод на плащане: PayPal, банков превод, наложен платеж, брой.

              Ако желаете издаване на фактура, оставете коментар към заявката с необходимата информация.


              Дати на провеждане: съгласно календар обучения и обявени събития на нашата Facebook страница.

              След създаване на заявка за участие ще се свържем с Вас за потвърждаване на датите.

              Ако имате въпроси можете да се свържете с нас, чрез меню контакти.


              Предпоставки

              • Преди да вземат участие в ICND1, участниците трябва да разполагат с:
              • Начална компютърна грамотност и умения за работа в Интернет
              • Основни умения свързани с компютърните операционни системи
              • Основни познания за IP адресите


              Описание на курса

              Настоящият курс ще предостави на студентите познания по QoS (Качество на услугите), виртуализация и облачни услуги, мрежова програмируемост свързана с WAN, access и core сегментите на мрежата.Ще предостави основно разбиране на мрежовите слоеве 1-3, които са отговорни за ядрото на routing и switching както и други напреднали технологии. Добавени са няколко нови теми, като, разирането на работата на защитните стени (firewalls), безжични контролери (wireless controllers) и точките за достъпп (access points), както и допълнителни теми фокусирани върху IPv6 и основите на мрежовата сигурност. Конфигурационните команди са представени, чре примери и практически примерни задачи в лабораторните упражнения. За курса е изграден изцяло нов пълноценен лаб, чрез виртуална IOS среда с гъвкави топологии, които приповтарят теоретичните концепции с практически упражнения, тясно обвързани с всеки отделен урок на курса. След завършване на настоящия курс, обучаемите ще могат да прилагат следните умения:

              • Описват мрежовите основи и изграждат малка локална мрежа
              • Осъществяват мрежова свързаност с интернет
              • Управляват сигурността на мрежовите устройства
              • Надграждат малки и средно големи мрежи с WAN свързаност
              • Описват основите на IPv6


              Съдържание на курса

              Module 1: Изграждане на малка мрежа

              Module 2: Изграждане на Internet свързаност

              Module 3: Практически модул с задача

              Module 4: Изграждане на средна по големина мрежа

              Module 5: Управление на мрежови устройства и сигурност

              Module 6: Практически модул с задача

              Module 7: Въведение в IPv6



              Video Training Microsoft 70-743 Upgrading your skills to Windows Server 2016

              Формат на курса: електронен формат, дигитална видео библиотека
              Език на курса: български (английски е наличен като опция)
              Метериали: в електронен формат, включени в цената
              Лабораторна среда: не е включена в курса.
              цената включва 20 уч.ч. онлайн обучение (теория).
              Sign-Up
              Метод на плащане: PayPal, банков превод, наложен платеж, брой.
              Заявка за издаване на фактура се приема към момента на записването на съответния курс.
              Фактура се издава в рамките на 7 дни от потвърждаване на плащането.
              За повече информация използвайте формата за контакт.
              Дати на провеждане: моля използвайте календара в основният ни сайт.
              Ще се свържем с Вас за потвърждаване на датите.

              След завършване на курса студентите ще могат да:
              Подготовка и инсталиране на Nano сървър, инсталация Server Core, и планират сървъра ъпгрейд и миграция стратегия.
              Опишете различните възможности за съхранение, включително маса формати преградни, основни и динамични дискове, файлови системи, виртуални твърди дискове, както и диск хардуер, и да обясни как да се управлява дискове и обеми.
              Опишете решения за съхранение на данни, и изберете подходящото решение за дадена ситуация.
              Прилагане и управление на складови помещения и Data Deduplication.
              Инсталиране и конфигуриране на Microsoft Hyper-V.
              Внедряване, конфигуриране и управление на Windows и Hyper-V контейнери.
              Опишете висока надеждност и възстановяване след бедствие технологии в Windows Server 2016.
              Планиране, създаване и управление на срив клъстер.
              Прилагане срив групиране за Hyper-V виртуални машини.
              Конфигуриране на Network Load Balancing (НЛБ) клъстер, и Плана за изпълнение на НЛБ.
              Създаване и управление на разполагане на изображения.
              Управление, наблюдение и поддържане на виртуална машина инсталации.

              Съдържание на курса
              Модул 1: Инсталиране, модернизация и мигриране на сървъри и работни натоварвания
              Този модул обяснява как да се подготви и да инсталирате Nano сървър и Server Core. Този модул обяснява как да се осъвремени и мигрира сървърни роли и натоварвания. И накрая, този модул обяснява как да се избере модел активиране на базата на вашите екологични характеристики.
              Уроци
              Въвеждане на Windows Server 2016
              Подготовка и инсталиране Nano сървър и Server Core
              Подготовка за ъпгрейди и миграции
              Мигриращите сървърни роли и натоварвания
              модели за активиране сървър за Windows
              Lab: Инсталиране и конфигуриране на Nano Сървър
              Изпълнителна Nano Сървър
              Завършване на пост-монтажни дейности на Nano сървър
              Извършване на дистанционното управление
              След завършване на този модул, учениците ще могат да:
              Изберете най-подходящата версия на операционната система Windows Server, и описват опциите за инсталиране и новите функции на Windows Server 2016.
              Подготовка и инсталиране на Nano сървър и Server Core.
              Помислете дали ъпгрейд или миграция е най-добрият подход, и да използвате инструменти, за да помогне да се определи ъпгрейд или миграция годност.
              Мигриране на сървърни роли и натоварвания в рамките на домейн и в различни домейни или гори.
              Изберете модел за активиране на базата на вашите екологични характеристики.
              Модул 2: Конфигуриране на местно съхранение
              Този модул обяснява как да се управлява дискове и обеми в Windows Server 2016.
              Уроци
              Управление на дискове в Windows Server 2016
              Управление на обеми в Windows Server 2016
              Lab: Управление на дискове и обеми в Windows Server 2016
              Създаване и управление на виртуални твърди дискове, като използвате Windows PowerShell
              Преобразуване на виртуални твърди дискове от .vhd да .vhdx
              Оразмеряване обем
              След завършване на този модул, учениците ще могат да:
              Управление на дискове в Windows Server 2016.
              Управление на обеми в Windows Server 2016.
              Модул 3: Прилагане на решения за съхранение на данни
              Този модул описва директно за съхранение на данни (DAS), мрежа-Attached Storage (NAS), и мрежи за съхранение (SANs). Той също така помага да се разбере Microsoft Internet съхранение на услугата за имена (iSNS) сървър, център за данни мостове, и Multipath I / O (MPIO). Освен това, този модул също сравнява Fibre Channel, Internet Small Computer Interface System (ISCSI), и Fibre Channel Over Ethernet (FCoE), и описва как да конфигурирате споделянето в Windows Server 2016.
              Уроци
              Преглед на пряк-за съхранение на данни, мрежово съхранение на данни, както и мрежи за съхранение
              Сравнявайки Fibre Channel, ISCSI, и FCoE
              Разбиране iSNS, център за данни мостове и MPIO
              Конфигуриране на споделяне в Windows Server 2016
              Lab: Планиране и конфигуриране на технологии и компоненти за съхранение
              Планиране на изискванията за съхранение
              Конфигуриране на ISCSI съхранение
              Конфигуриране и управление на инфраструктурата на акция
              След завършване на този модул, учениците ще могат да:
              Опишете DAS, NAS и SAN мрежи, и сценариите за ползване за всяка топология.
              Сравнете Fibre Channel, FCoE, с цел ISCSI и initiator.Describe iSNS, MPIO, център за данни мостове, и Windows Storage Server 2016 (две версии-Workgroup и Standard).
              Конфигуриране на сървър за съобщения блок (SMB) и мрежова файлова система (NFS) акции с помощта Server Manager и Windows PowerShell.

              Модул 4: Прилагане на складови помещения и Data Deduplication
              Този модул обяснява как да се прилага и управлява складови помещения. Този модул обяснява как да се прилагат данни Deduplication.
              Уроци
              Spaces изпълнение съхранение
              Управление на складови помещения
              Изпълнителна Данните Deduplication
              Lab: Spaces изпълнение съхранение
              Създаване на пространство за съхранение
              Активиране и конфигуриране на нивата за съхранение
              Lab: Прилагане Data Deduplication
              Инсталиране на данни Deduplication
              Конфигуриране на данни Deduplication
              След завършване на този модул, учениците ще могат да:
              Прилагане на складови помещения, като решение за съхранение на данни.
              Управление на складови помещения с помощта Server Manager и Windows PowerShell.
              Прилагане Data Deduplication.
              Модул 5: Инсталиране и конфигуриране на Hyper-V и виртуални машини
              Този модул осигурява преглед на Hyper-V. Този модул обяснява как да конфигурирате, управлявате и инсталиране на Hyper-V.
              Уроци
              Преглед на Hyper-V
              Инсталиране на Hyper-V
              Конфигуриране на съхранение на Hyper-V хост сървъри
              Конфигуриране на мрежи на Hyper-V хост сървъри
              Конфигуриране на Hyper-V виртуални машини
              Управление на Hyper-V виртуални машини
              Lab: Инсталиране и конфигуриране на Hyper-V
              Инсталиране на ролята на Hyper-V сървър
              Конфигуриране на Hyper-V настройки
              Създаване и конфигуриране на виртуална машина
              Управление на виртуална машина с помощта на PowerShell Direct
              След завършване на този модул, учениците ще могат да:
              Опишете Hyper-V и виртуализация.
              Подгответе се за инсталиране на Hyper-V ролята на.
              Конфигуриране на съхранение на Hyper-V хост сървъри.
              Конфигуриране на мрежови на Hyper-V хост сървъри.
              Конфигуриране на Hyper-V виртуални машини.
              Преместете виртуални машини от един хост на друг хост, използвайки PowerShell Direct за управление на виртуална машина, и управлява различни виртуални настройки на устройството.

              Модул 6: Внедряването и използването на Windows Server и Hyper-V контейнери
              Този модул осигурява и преглед на контейнери в Windows Server 2016. Той също така обяснява как да се разположи, инсталиране, конфигуриране и управление на контейнери в Windows Server 2016.
              Уроци
              Преглед на контейнери в Windows Server 2016
              Внедряването на Windows Server и Hyper-V контейнери
              Инсталиране, конфигуриране и управление на контейнери
              Lab: инсталиране и конфигуриране на контейнери
              Инсталиране и конфигуриране на контейнери Windows Server, като използвате Windows PowerShell
              Инсталиране и конфигуриране на контейнери Windows Server с помощта Docker
              След завършване на този модул, учениците ще могат да:
              Обяснете целта на Windows Server и Hyper-V контейнери.
              Внедряване и управление на Windows Server и Hyper-V контейнери.
              Инсталиране, конфигуриране и управление на контейнери.
              Модул 7: Преглед на висока надеждност и възстановяване след бедствие
              Този модул осигурява преглед на висока надеждност, непрекъснатост на бизнеса, и за възстановяване след бедствие. Освен това той обяснява как да се планира висока надеждност и решения за възстановяване след бедствие. Освен това, в този модул вие ще знаете как да направите резервно копие и възстановяване на Сървър 2016 операционната система и данните Windows с помощта на Windows Server Backup. И накрая, ще научите за Windows Server 2016 с висока наличност с срив групиране.
              Уроци
              Дефиниране на нива на достъпност
              Планиране на висока надеждност и възстановяване след бедствие решения с Hyper-V виртуални машини
              Архивиране и възстановяване на Сървър 2016 операционната система и данните Windows с помощта на Windows Server B
              Висока достъпност с срив групиране в Windows Server 2016
              Lab: планиране и прилагане на висока надеждност и възстановяване след бедствие разтвор
              Определяне на подходящо висока надеждност и възстановяване след бедствие разтвор
              Прилагане на миграцията съхранение
              Изпълнение на Hyper-V Replica
              След завършване на този модул, учениците ще могат да:
              Опишете висока надеждност, непрекъснатост на бизнеса, и за възстановяване след бедствие.
              План за висока надеждност и възстановяване след бедствие решения с Hyper-V виртуални машини.
              Архивиране и възстановяване на Hyper-V домакини, виртуални машини, Active Directory Domain Services (AD DS), и на файлове и уеб сървъри, като използвате Windows Server Backup.
              Опишете Windows Server 2016 с висока наличност с срив групиране.
              Модул 8: Прилагане и управление на срив групиране
              Този модул обяснява как да се планира, да създавате, конфигуриране, поддръжка и отстраняване на неизправности на срив клъстер. Този модул обяснява как да се прилагат сайт висока наличност с разтягане на клъстери.
              Уроци
              Планиране на срив на клъстерите
              Създаване и конфигуриране на нов срив на клъстерите
              Поддържането на срив на клъстерите
              Отстраняване на срив на клъстерите
              Изпълнение сайт висока наличност с разтягане на клъстери
              Lab: Прилагане на срив на клъстерите
              Създаване на срив на клъстерите
              Проверка на кворума настройки и добавяне на възел
              Lab: Управление на срив на клъстерите
              Evicting възел и проверка на кворума настройки
              Промяна на кворум от Disk свидетел File Share Witness, и определяне на гласуване възел
              Добавяне и премахване на дискове от клъстера
              След завършване на този модул, учениците ще могат да:
              Опишете изискванията и съображения инфраструктура за преодоляване на срив клъстер.
              Създаване и конфигуриране на нов срив клъстер.
              Монитор и поддържане срив клъстери.
              Отстраняване на срив клъстери чрез използване на различни инструменти като Performance Monitor, Event Viewer, и Windows PowerShell.
              Конфигуриране и прилагане на участък клъстер.
              Модул 9: Изпълнение срив групиране за Hyper-V виртуални машини
              Този модул описва интегрирането на Hyper-V виртуални машини в среда с клъстери. Той също така обяснява как да се внедри и поддържа Hyper-V виртуални машини върху срив клъстери. Освен това, този модул обяснява как да конфигурирате здравна защита на мрежата.
              Уроци
              Преглед на интегриране на Hyper-V в Windows Server 2016 с срив групиране
              Внедряване и поддържане на Hyper-V виртуални машини върху срив клъстери
              Основни характеристики за виртуални машини в среда с клъстери
              Lab: Прилагане срив групиране с Hyper-V
              Конфигуриране на срив клъстер за Hyper-V
              Конфигуриране на високо достъпна виртуална машина
              След завършване на този модул, учениците ще могат да:
              Обяснете на интеграцията на Hyper-V в Windows Server 2016 с срив групиране.
              Осъществяване и поддържане на Hyper-V виртуални машини върху срив клъстери.
              Опишете и конфигуриране на здравна защита на мрежата.
              Модул 10: Прилагане на мрежа за балансиране на натоварването
              Този модул осигурява преглед на Нова Люблянска Банка клъстери. Той също така обяснява как да се планира и да конфигурира изпълнение на клъстер NLB.
              Уроци
              Преглед на Нова Люблянска Банка клъстери
              Конфигуриране на НЛБ клъстер
              Планиране на изпълнението NLB
              Lab: Прилагане на НЛБ клъстер
              Въвеждането на НЛБ клъстер
              Конфигуриране и управление на НЛБ клъстера
              Валидиране висока наличност на клъстера NLB
              След завършване на този модул, учениците ще могат да:
              Опишете NLB и как тя работи.
              Конфигуриране на НЛБ клъстер.
              Опишете съображения за прилагане на НЛБ.
              Модул 11: Създаване и управление на изображения за разполагане
              Този модул предвижда въвеждане в снимки разполагане. Той също така обяснява как да създавате и управлявате разполагане на изображения с помощта на инструментариума на Microsoft Deployment (MDT). Освен това, той обяснява как да се оценят изискванията на организацията за виртуализация на сървърите.
              Уроци
              Въведение в изображения за разполагане
              Създаване и управление на изображения за разполагане с помощта MDT
              Виртуалната машина среда за различни натоварвания
              Lab: Използване MDT за разполагане на Windows Server 2016
              Инсталиране и конфигуриране на MDT
              Създаване и внедряване на изображение
              След завършване на този модул, учениците ще могат да:
              Обяснете целите на разполагане на изображения и инструментите, които се използват, за да разгърне и да ги поддържа.
              Прилагане и управление на разполагане на изображения с помощта на MDT.
              Оценят изискванията на тяхната организация за виртуализация на сървърите.
              Модул 12: Управление, мониторинг и поддържане на виртуална машина инсталации
              Този модул осигурява преглед на WSUS и обяснява опциите за разполагане. Тя обяснява как да се актуализира процес на управление с WSUS а също и как да се използва за следене на ефективността. Освен това, този модул също осигурява преглед на PowerShell желаното състояние Configuration (DSC) и сървър 2016 инструменти за наблюдение на Windows. И накрая, този модул се описва как да се използва за следене на ефективността и мониторинг на регистри на събития.
              Уроци
              Преглед WSUS и разгъване на опции
              процес на управление на обновяване с WSUS
              Преглед на PowerShell DSC
              Преглед на Windows Server 2016 инструменти за мониторинг
              Използването следене на ефективността
              Мониторинг на регистрите на събития
              Lab: Прилагане на WSUS и внедряването на актуализации
              изпълнение WSUS
              Конфигуриране на настройки за обновяване
              Приемане и разгръщане на актуализация чрез използване на WSUS
              Lab: Мониторинг и отстраняване на неизправности на Windows Server 2016
              Създаване на основния капацитет
              Идентифициране на източника на проблема с производителността
              Преглед и конфигуриране на централизирани регистри на събития
              След завършване на този модул, учениците ще могат да:
              Опишете целите на Windows Server Update Services (WSUS) и на изискванията за прилагане на WSUS.
              Управление на процеса на актуализация с WSUS.
              Опишете целите и ползите от PowerShell DSC.
              Опишете достъпно инструментите за контрол в Windows Server 2016.
              Опишете как да се използва за следене на ефективността.
              Опишете как да управлявате записите на събитията.