Training_syllabus_GIDx - ICS

screechingagendaNetworking and Communications

Oct 26, 2013 (4 years and 2 months ago)

97 views

Basic Level

Courses: Switching, Routing, Cloud, Security, Window OS


Networking


Switching & Routing (3 days each topic)

Identifying Data Network Operation

-

Introduction



Distinguishing the purposes and functions of various network devices



Selecting the
components required to meet a network design



Applying the OSI and TCP/IP models to troubleshoot a network



Describing common network applications



Inspecting operation of protocols in OSI and TCP models



Examining IP and its functionality



Identifying the use
of reliable vs. unreliable protocols



Assessing the bandwidth impact of Voice over IP


Explaining the operation of Cisco switches and switching concepts
-

Switching



Performing initial switch configuration tasks and enabling remote access



Verifying switch
operation using the IOS basic command
-
line



Implementing and verifying port security to prevent intrusions



Identifying and resolving network media issues


Configuring, Verifying and Troubleshooting VLANs and Interswitch Communications

-

Switching



Identifyin
g enhanced switching technologies



Designing VLANs to logically separate networks



Implementing trunking on Cisco switches to link domains



Troubleshooting interVLAN routing issues using the CLI



Configuring, verifying and troubleshooting Spanning Tree operati
on



Enabling Rapid Spanning Tree protocol to enhance fault tolerance



Interpreting SHOW and DEBUG commands to verify the status of a switched network



Implementing switch security to prevent intrusions and eavesdropping


Implementing an IP Addressing Scheme
-

Switching



Designing a VLSM addressing scheme



Applying design concepts to manage addressing in a medium
-
sized network



Creating a classless addressing scheme using VLSM and route summarization



Diagnosing and correcting common problems associated with IP add
ressing



Integrating IPv6 in your organization



Recognizing the IPv6 address space and its new features



Verifying the requirements for running IPv6



Implementing compatibility with IPv4 networks using dual stacks and tunneling


Evaluating and troubleshooting LAN/WAN connectivity
-

Switching



Implementing static and dynamic addressing services



Identifying and correcting IP addressing issues


Enabling Routing in a Small Network


Switching & Routing basics



Evaluating routing
concepts and protocols



Inspecting the operation of Cisco the bootup process



Verifying network status and router operation using the CLI



Selecting the appropriate media and connectors



Configuring and verifying routing using RIPv2


Configuring and
Troubleshooting Routing on Cisco Devices

-

Routing



Reviewing Distance
-
Vector and Link State routing protocols



Evaluating methods of routing and routing protocols



Configuring and verifying OSPF and EIGRP routing



Troubleshooting routing issues using SHOW and

DEBUG commands



Configuring the router using the CLI



Inspecting the operation status of a device and its interfaces



Verifying device configuration and network connectivity



Reconfiguring routing with static routing



Managing IOS configuration



Displaying and
changing Cisco IOS boot options



Implementing password and physical security


Implementing and Troubleshooting NAT and ACLs in a Medium
-
Sized Network

-

Routing



Enhancing security with Access Control Lists (ACLs)



Describing the purpose and types of ACLs and
their role in securing network traffic



Applying ACLs based on network policy requirements



Verifying and monitoring ACLs in a network environment using the CLI



Troubleshooting and correcting ACL implementation issues



I
mplementing Network Address Translation

(NAT)



Explaining the basic operation of NAT and PAT to increase security and conserve addresses



Configuring NATs using the CLI and SDM



Identifying and correcting NAT implementation issues


Implementing and Verifying WAN Links
-

Routing



Reviewing
encapsulation methods for connecting to a WAN



Enabling authentication for secure WAN connections



Configuring and verifying routed WAN connections


Cloud Computing (
3 days
)

Introduction to Cloud Computing



Defining cloud computing



Components of a computing
cloud



Differentiating types of clouds: public, private, hybrid


D
rivers of cloud computing solutions



Memory



Processing



Storage



Network


Infrastructure as a Service (IaaS)



Introduction to IaaS



Accessing IaaS



Provisioning servers on demand



Handling dynamic
and static IP addresses



Tools and support for management and monitoring



Security, availability and disaster recovery strategies


CompTIA Security+

(3 days)




Introduction to General Security Concepts



InfoSec Overview and History



Access Control



Authentication



Non
-
Essential Services/Systems/Protocols



Attacks



Malicious Code



Social Engineering



Auditing


Communication, Infrastructure Security



Remote Access



Email



Web



Directory



File Transfer



Wireless



Devices



Media



Security Topologies



Intrusion
Detection



Security Baselines


Operational/Organizational Security



Standards and Protocols



Key Management/Certificate Lifecycle



Suspension



Recovery



Renewal



Destruction



Key Usage



Physical Security



Disaster Recovery

(basic)



Policy and Procedures



Privilege
Management



Risk Identification


Windows OS Management & Overview

(3 days)

Operating System Overview



Benefits of upgrading to Windows Server 2008



Analyzing and implementing the features



Installing and Upgrading Servers



Selecting the appropriate deployment
method



Multiple Activation Key



Key Management Server



Adding and configuring server roles and features



Service packs and H
otfixes



What is

Active Directory



Active Directory Domain Services (AD DS)



Domain Controllers



Organizational Units, users and groups



U
ser account properties and profiles

introduction



Managing
resource access with role
-
group



Configuring and Managing the System



Event Viewer



Device Manager



Windows Firewall



Centralizing events from multiple server event logs



Introducing PowerShell for admin
istrative tasks



Reliability Monitor



Troubleshooting the OS with Windows Recovery Disk



Managing disks, full backup and restore



What is
Master Boot Record (MBR)



GUID Partition Table (GPT)



Saving the system and data with Windows Server Backup



Inherited vs.
explicit Access Control Entries



Controlling Network Components and Services



Managing network settings



Configuring the Network and Sharing Center



Integrating IPv4 and IPv6 protocols



Sharing resources across the network



Recovering with Shadow Copies and Prev
ious Versions



Increasing file access responsiveness with BranchCache



File Server Resource Manager (FSRM)



Creating quotas based on prebuilt templates



Filtering extraneous files with screening technologies



Administering the Active Directory



Distributing and
delegating administrative power



Allocating responsibilities for simplified administration



Configuring environments with Group Policies



Identifying common settings with the Group Policy Management Console (GPMC)



Deploying Remote Desktop Services (RDS)



Intermediate Level

Courses:
Switching, Routing, Storage, Cloud, Security, Operati
on & Maintenance, B
uilding Management
System (BMS)
, Enterprise Operation Control (EOC)

CCNP


Switching, Routing
(3 days each topic)


ROUTE/Testing

-

Routing



Understand
Fundamental Routing Operations



Implement EIGRP Operations



Implement Multi
-
area OPSF Operations



Implement IPv6 Routing



Implement eBGP for Enterprise Connectivity



Implement Route Distribution



Implement Layer 3 Path Control Solutions


SWITCH/Testing



Switching



Implement VLANs/VTP



S
ecure VLANs



Conduct the Operation of Spanning Tree Protocols in a Hierarchical Network



Layer 3 Switching



Configure Support for Advanced Services (Voice, Video, Wireless)



Describe Wireless Client Access



Implement High Availab
ility


T
rooubleshooting/
Testing



EOC Functions



Troubleshoot Routing Protocols



Troubleshoot Routing Redistribution



Troubleshoot IPv6



Troubleshoot VLANs



ITroubleshoot Switch Security



Troubleshoot VoIP and Video


Storage System (3 days)


Introduction to
information storage



Data center environments



RAID



Intelligent storage system


Storage Networking Technologies



Disks and intelligent storage systems



RAID levels



SAN components and terminology



NAS components and terminology



Storage system features used in ba
ckup and recovery



Replication and continuous data protection technologies



Fibre Channel SAN (FC SAN)



IP SAN and FCoE



Network attached storage (NAS)



Object based and unified storage


Backup, Archive,

and Replication



Backup concepts and terms



Generic backup
architecture



Introduction to business continuity



Backup and archive



Local replication




Remote replication



Management of Storage



Securing storage infrastructure



Managing storage infrastructure


C
loud Computing


3 days

Cloud Computing



Components of a
computing cloud



Differentiating types of clouds: public, private, hybrid



Identifying private cloud technologies



Categorizing service types



Comparing vendor cloud products: Amazon, Google, Microsoft and others


Improving utilization with virtualization



Choosing para
-

or hardware
-
assisted virtualization



Utilizing cores and hyperthreading



Calculating performance with EC2 Compute Units (ECU)



Comparing virtualization and cloud computing


Deploying an On
-
Site Private Cloud



Identifying architectural components

of Eucalyptus



Analyzing compatibility with A
mazon
W
eb
S
ervices (AWS)



Deploying a Proof of Concept (POC) installation



Isolating instances with VLANs



Controlling access with security groups



Assigning virtual addresses to instances



Providing automatic High A
vailability (HA)

Managing a Eucalyptus private cloud



Customizing Eucalyptus Machine Images (EMI)



Launching and connecting to instances with key pairs



Interconnecting public, private and community clouds



Handling excess demand with cloud bursting

Evolving
to hybrid clouds



Exploiting the advantages of hybrid clouds



Examining Hybrid Cloud Use Cases

Considering alternative private cloud solutions



Evaluating a scorecard of leading private cloud offerings



VMware vCloud



Hyper
-
V


CCNP
-

Security (3 days
)

This
course is intended for those with at least one year of networking experience and valid CCNA and CCDA
certifications.




Advanced IP addressing and routing in implementing scalable and secure Cisco ISR routers connected to LANs
and WANs



Secure routing solutio
ns



Plan, configure and verify the implementation of complex enterprise switching solutions using



Cisco’s Campus Enterprise Architecture



Secure integration of VLANs, WLANs, voice and video into campus networks



Plan and perform regular maintenance on complex

enterprise routed and switched networks



Using technology
-
based practices and a systematic ITIL
-
compliant approach to perform network
troubleshooting



Network infrastructure and design



Intelligent network services



Converged network solutions



Securing
Networks with Cisco Routers and Switches



Implementing Cisco Intrusion Prevention System v7.0



Deploying Cisco ASA Firewall Solutions



Deploying Cisco ASA VPN Solutions



Implementing Cisco IOS Network Security



Securing Networks with Cisco Routers and Switches



Deploying Cisco ASA Firewall Solutions



Deploying Cisco ASA VPN Solutions



Implementing Cisco Intrusion Prevention Systems


Additional
Security
Course
(
3

day)

Building a Secure Organization



Real threats that impact
cybersecurity



Hackers inside and out



Eavesdropping



Spoofing



Sniffing



Trojan horses



Viruses



Defining your information assurance objectives



Assessing your exposure


Verifying User and Host Identity



Assessing traditional static password schemes



Creating a good quality password policy to prevent
password guessing and cracking



Protecting against social engineering attacks



Encrypting passwords to mitigate the impact of password sniffing



Evaluating strong authentication methods



Preventing password replay using one
-
time and tokenized passwords



What is

two
-
factor authentication



Authenticating hosts



Shortcomings of IP addresses



Address
-
spoofing issues and countermeasures



Solutions for wireless networks


Preventing System Intrusions



Discovering system vulnerabilities



Searching for operating system vulnera
bilities



Discovering file permission issues



Limiting access via physical security



Encrypting files for confidentiality



Encryption with application
-
specific tools



Recovering encrypted data



Hardening the operating system



Locking down user accounts



Securing
administrator's permissions



Protecting against viruses


Guarding Against Network Intrusions



Scanning for vulnerabilities



Restricting access to critical services



Preventing buffer overflows



Reducing denial
-
of
-
service (DoS) attacks



Securing DNS



Limiting the
impact of common attacks



Deploying firewalls to control network traffic



Contrasting firewall architectures



Preventing intrusions with filters



Implementing cyber security policy



Building network firewalls



Evaluating firewall features



Selecting an architectu
re and a personal firewall


Ensuring Network Confidentiality



Mitigating threats from connected hosts



Partitioning the network to prevent data leakage



Identifying wireless LAN vulnerabilities



Securing data
-
link layer with PPTP and L2TP


Cryptography/Operational/Organizational Security



Algorithm



Concepts of Using Cryptography



PKI



Standards and Protocols



Key Management/Certificate Lifecycle



Suspension



Recovery



Renewal



Disaster Recovery



Business Continuity



Policy and Procedures



Forensics



Risk Identification


Operations and

M
aintenance

(O&M)

Functions



3 days

Introduction to
Environments



Upgrading the existing operating system



Enabling servers with volume license activation



Updating and maximizing security with WSUS



Leveraging the
multi
-
server Server Manager



Installing roles/features with the Dashboard



Setting up Windows Server Core



Performing administrative tasks with PowerShell


Constructing

and Administrating

Active Directory (AD)



Active Directory infrastructure components



Organi
zing with forests, domains and sites



Raising domain and forest functional levels



Locating and transferring Flexible Single
-
Master Operation (FSMO) roles



Migrating existing domains to Windows Server 2012



Building Domain Controllers (DCs) to host the AD



Configuring DNS and managing DC Replication



Creating objects with the GUI and PowerShell



Simplifying administration with group nesting



Generating users, groups and OUs with PowerShell



Analyzing the AD with the Administrative Center


Maintaining and
Protect
ing
Disk &
File System Resources



Backing up, restoring and organizing disks



Enabling disaster recovery with Windows Server Backup



Maximizing protection with cloud
-
based Online Backup



Increasing resilience with storage pools and spaces



Optimizing disk space

with Data Deduplication



Creating and attaching VHD and VHDX virtual disks



Defining security on files and folders



Adjusting User Account Control notification levels



Limiting access with custom Access Control Lists (ACLs)



Auditing file system objects for
specific troubleshooting



Specifying claims and tags for Dynamic Access Control


Managing and Troubleshooting Servers



Exploiting administrative tools and applets



Action Center



Task Scheduler



Performance Alerts

using Enterprise Monitoring tool



iSCSI initiato
r



Configuring the Windows Firewall for remote access



Measuring reliability and analyzing performance



Producing diagnostic reports with Data Collector Sets



Determining recurrent issues with Reliability Monitor



Fixing startup issues with the Recovery
Environment


Administering the Active Directory



Assigning administrative rights



Analyzing results from the Best Practices Analyzer (BPA)



Delegating control for seamless administration



Deploying Group Policies for central management



Contrasting computer/use
r policies and preferences



Locking down the desktop with administrative templates

Building Automation Systems


Building Management System



Day 2 Training

(3 days)


Introduction to the Refrigeration Cycle



Understanding the Components of an A/C system



Understanding Fixed Air Volume & Variable Air Volume Applications



Understanding Psychrometry



Understanding Input & Outputs



Introduction to Sensors, Actuators, Input Devices, Output Devices & Logic statements, PID Loops



Building Utility Management & Control

Strategy



Point Scheduling & I/O Summary



Integration


Fire, Moisture Detection & Alarm System



Fire Lifecycle



Detection Technologies



Fire Panel Technologies



I
nput / Output Devices



Detector & Device Wiring Schema



Moisture sensors



Fireman's Telephony &
Talkback system



Fire Safety Strategies


Electronic Physical Security (Access Control System)



Access Control systems



Access Control Technologies



Data Encryption & Security



Access Control Strategy



Access Controllers



Biometrics



Barriers



Reporting &

Operations


Electronic Physical Security (Access Control System)



Introduction to Optics in Cameras



Types of Camera Technologies



Integration


Gas Suppression System



Introduction to Clean Agent Fire Retardants



Types of Clean Agents



Type of Application



Car
bon Dioxide



FM 200 or NAF227


Enterprise Operating Center
(EOC)
Troubleshooting
& Information Technology Information Library
(ITIL)
(
3 days)

Service operation and the overall ITIL lifecycle



Principles and objectives



Functions and common activities



How
service operation creates business value

Balancing conflicting goals



Internal IT vs. external business view



Stability vs. responsiveness



Quality of service vs. cost of service



Reactive and proactive activities

Core Service Operation Processes



Policies, pri
nciples and basic concepts



Purpose and objectives



Incident Review, and Escalation procedure



Value to business



Process activities, methods and techniques



Triggers, inputs, outputs and interfaces



Challenges and risks

Primary ITIL processes within service
operation



Event management: active and passive monitoring



Restoring normal service quickly through incident management



Request fulfillment



Managing problems with root cause analysis



Access management

Common Service Operation Activities



Monitoring and
control of IT operations



Detecting the status of services and CIs



Taking appropriate corrective action



Console management/operations bridge: a central coordination point for monitoring and managing services

Management of the infrastructure



Mainframe, serve
r and network management



Storage and database administration



Managing directory services and desktop support



Facilities and datacenter management



Improving operational activities

Operational aspects from other lifecycle phases



Change, configuration and rel
ease



Availability



Capacity



Service continuity

Organizing for Service Operation



Mapping service operation functions to activities



Roles and responsibilities



Understanding the organizational context



Service operation structure



Service desk



Technical
management



IT operations management



Application management

Key functions of the service desk



Logging incidents and requests



First
-
line investigation and diagnosis



Managing the lifecycle of incidents and requests



Keeping users informed

Structuring the servi
ce desk



Local vs. centralized



The virtual service desk



Follow the sun operation

Technology
-
Related Issues



Technology, tools and expertise requirements



Defining architecture standards



Involvement in the design and build of new services and operational pract
ices



Contributing to service design, service transition and continual service improvement projects



Evaluating change requests



Matching technology to the organizational situation

Implementation Challenges and Risks



Managing change in service operation



Servi
ce operation and project management



Assessing and managing risk



Operational staff in design and transition



Planning service management technologies



Identifying critical success factors (CSFs)





Advanced Level

Courses:
Routing & Switching,
Security
, Hyper
-
V, Security, Windows Enterprise
Server,

Cloud
Migration
, PMP

C
CIE


Routing & Switching

(5 day

per topic
)

Week 1 T
opics
Include
(5 days)

Bridging and Switching



Trunking & Etherchannel



VTP and VLANs



STP, RSPT and MSTP



QinQ Tunneling



Advanced Spanning Tree
Features



Storm
-
Control



Private VLANs



Additional Catalyst Security Features



SPAN and RSPAN



Catalyst 3560 Troubleshooting



F
rame
-
Relay Features



Frame
-
Relay Switching



Frame
-
Relay Troubleshooting



PPP, PPPoFR and PPPoE



PPP Authentication and Advanced PPP
Features



PPP Troubleshooting



Additional Layer 2 Technologies



Layer 2 Troubleshooting


IGP Routing



OSPF Configuration



Advanced OSPF: Area Types, Summarization, Authentication, Virtual
-
Links, etc.



EIGRP Configuration



Advanced EIGRP: Authentication, Summariza
tion, Metric Tuning, etc.



RIP Configuration



Advanced RIP: Timers Tuning, Authentication, Summarization, etc.



R
oute Redistribution



Additional IGP
-
Related Topics



General Routing Troubleshooting (RIP, EIGRP, OSPF)



Advanced OSPF Troubleshooting



Advance
d EIGRP Troubleshooting



IGP Troubleshooting


BGP



BGP Configuration



BGP Router Reflectors and Confederations



Route Aggregation



Community Signaling



BGP Best Path Manipulation: AS_PATH, Local Pref, Other Attributes



Route Filtering Features



Advanced BGP:
Conditional Advertisement, ORF, etc.



Additional BGP Features



Advanced BGP Troubleshooting


MPLS VPN



MPLS LDP



MP
-
BGP VPNv4



Route Target Filtering



PE
-
CE Routing: OSPF and RIP



Inter
-
site connectivity



Advanced Features: Summarization, Internet Access, etc.



MPLS and MPLS VPN Troubleshooting


Week 2 Topics Include

(5 days)


IPv6



Addressing and Tunneling



R
outing: RIPng, OSPFv3 and EIGRPv6



Advanced OSPFv3 Features: Area types, Summarization, etc.



OSPFv3 Troubleshooting



Additional IPv6
-
related Topics



IPv6
Troubleshooting


IPv4 and IPv6 Multicast



PIM Sparse and Dense Mode



Auto
-
RP and BSR



RP Filtering Techniques



PIM and IGMP Access Control



RPF Failures



Tunneling Multicast Traffic



P
IM over NBMA Networks



Interdomain Multicast (MSDP)



Additional Multicast Feature
s



Basic and Advanced Multicast Troubleshooting


QoS



QoS DiffServ and InterServ Theory



Understanding Policing and Shaping



Queueing Techniques: Legacy and CBWFQ/HQF



Congestion Management Techniques



Frame
-
Relay Traffic Shaping (Legacy and MQC)



Resource
Reservation Protocol (RSVP)



Understanding SRR, WRR, DWRR Theory



Catalyst 3560 SRR (Shaped and Shared)



Catalyst 3560 QoS: Queueing and Policing



Catalyst 3560 Port and VLAN Based QoS


Security



Access
-
Lists in Routers and Switches



CBAC Feature Set



Zone
-
Based
Firewall



TCP Intercept



Managing Router Access: Privilege levels, RBAC



Additional Security Topics


IP Services



First Hop Redundancy Services: HSRP, GLBP, VRRP



IOS Features: Menus, HTTP server, DHCP etc



Management Features: SNMP and RMON



NAT



SLA and Object
Tracking



OER/PfR



Embedded Event Manager (EEM)



Additional IP Services



T
roubleshooting


CISSP


Security (
5 day course)

Access Control

A
collection of mechanisms that work together to create a security architecture to protect the assets of the
information sy
stem.



Access Control Concepts



Concepts/Methodologies/Techniques



Attacks



Effectiveness


Telecommunications and Network Security

Discusses network structures, transmission methods, transport formats and security measures used to provide
availability,
integrity and confidentiality.



Telecommunications and Network Security Concepts



Network architecture and design



Network components



Communication channels



Network attacks


Information Security Governance and Risk Management

The identification of an organiza
tion’s information assets and the development, documentation and
implementation of policies, standards, procedures and guidelines.



Info Sec Governance and Risk Management Concepts



Security governance and policy



Risk management concepts



Personnel security



Information classification/ownership



Contractual agreements and procurement processes



Security education, training and awareness



Certification and accreditation


Cryptography

The principles, means and methods of disguising information to ensure its integri
ty, confidentiality and
authenticity.



Cryptography Concepts



Encryption concepts



Public Key Infrastructure (PKI)



Digital signatures



Information hiding alternatives



Cryptanalytic attacks


Security Architecture and Design

Contains the concepts, principles, st
ructures and standards used to design, implement, monitor, and secure,
operating systems, equipment, networks, applications, and those controls used to enforce various levels of
confidentiality, integrity and availability.



Security Architecture and Design
Concepts



Fundamental concepts of security models



Countermeasure principles



Capabilities of information systems (e.g. memory protection, virtualization)



Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control)


Operations Security

Used to identify the controls over hardware, media and the operators with access privileges to any of these
resources.



Operations Security Concepts



Resource protection



Attack prevention and response



Incident response



Patch and vulnerability management


Bus
iness Continuity and Disaster Recovery Planning

Addresses the preservation of the business in the face of major disruptions to normal business operations.



Business Continuity and Disaster Recovery Concepts



Business impact analysis



Disaster recovery process



Recovery strategy



Provide training


Legal, Regulations, Investigations and Compliance

Addresses computer crime laws and regulations; the investigative measures and techniques which can be used
to determine if a crime has been committed and methods to gath
er evidence.



Legal, Regulations, Investigations and Compliance Concepts



Legal Issues



Forensic procedures



Investigations

Compliance requirements/procedures


Physical (Environmental) Security

Addresses the threats, vulnerabilities and countermeasures that ca
n be utilized to physically protect an
enterprise’s resources and sensitive information.



Physical (Environmental) Security Concepts



Site/facility design considerations



Internal security



Perimeter security



Facilities security


Windows Enterprise Server
-

Employing Administration Tools

(5 days)

Managing the server



Installing roles with Server Manager



Configuring functionality with PowerShell


Enabling remote administration



Identifying barriers to remote management



Employing Group Policies to overcome issues



Implementing Windows Remote Management



Tuning the Windows Firewall



Making use of Server Manager groups


Administering with PowerShell



Managing Local and Remote Servers



Leveraging the scripting capabilities of PowerShell


Deploying Server Core



Reviewing
the features and benefits of Server Core



Preparing for a production environment



Administering the core remotely



Determining the most effective scenario for deployment


Securing Windows Server 2012



Defining security components



Analyzing role
-
based security



Testing Dynamic Access Control



Safeguarding the server with the Windows Firewall


Building security policies



Documenting server security



Composing optimal Group Policies


Auditing the server



Diagnosing security issues



Creating an audit trail



Filtering the
security log


Optimizing Server Performance



Assessing workloads



Balancing applications and server roles



Evaluating hardware and software components



Reconfiguring the operating system


Monitoring server performance



Analyzing system behavior with Resource
Monitor



Establishing baselines with Performance Monitor



Designing Data Collector Sets


Detecting and resolving performance concerns



Identifying Performance Monitor counters



Solving the challenge of memory leaks



Exploring the effect of services on server pe
rformance


Troubleshooting Windows Server 2012



Recovering from boot process failures



Breaking down the pre
-
Windows boot process



Appraising the Windows load sequence


Selecting the appropriate recovery environments



Booting to the recovery console



Leveraging

WinRE to correct the problem


Repairing key Windows components



Maintaining a stable registry



Managing service accounts and privileges



Identifying faulty drivers



Solving network issues


Extracting information from the Event Viewer



Collecting events from re
mote servers



Attaching subscriptions to selected events


Implementing a High
-
Availability Environment



Clustering Windows servers



Meeting failover clustering requirements



Recognizing the role of Quorums


Virtualizing servers



Increasing scalability potential

with Hyper
-
V



Speeding up recovery with replicas



Maintaining high availability with live migration


Hyper
-
V

(
3

days)


Preparing a Hyper
-
V Environment



Introduction to virtualization



Investigating Type I and Type II hypervisors



Validating the hardware and
software prerequisites



Comparing Hyper
-
V to VMware and Xen offerings



Implementing Hyper
-
V



Enabling the server role



Leveraging management interfaces


Building Virtual Machines (VMs)



Configuring the virtual hardware



Allocating CPU resources



Distributing stat
ic and dynamic memory



Connecting to removable hardware



Architecting the storage fabric



Constructing dynamic and fixed
-
sized virtual hard disks



Increasing performance with pass
-
through disks



Reverting system state with snapshots



Converting, compressing and
expanding VHDs



Creating virtual networks



Optimizing network performance



Implementing external, internal and private switches


Optimizing and Troubleshooting



Monitoring the virtual infrastructure



Exploiting the Best Practices Analyzer (BPA) results



Inspecti
ng live parent and child performance data



Gathering hypervisor metrics through Performance Monitor



Detecting and resolving issues



Examining and filtering event logs



Triggering alerts for efficient remediation



Controlling resource usage


Relocating Virtual
Machines and Disks



Transferring backend data



Importing and exporting virtual machines



Performing online storage migrations



Redistributing Hyper
-
V workloads with live migrations



Migrating locally stored VMs between hosts



Optimizing migrations with Storage A
rea Networks (SANs)


Increasing Service and Application Availability



Eliminating single points of failure



Avoiding network outages with NIC teaming



Mirroring VMs in real time with Hyper
-
V replicas



Improving fault tolerance with failover clusters



Monitoring

cluster resources and VM states



Configuring appropriate quorum models



Expediting live migration with clustering


System Center Virtual Machine Manager (SCVMM)



Establishing a private cloud



Correlating benefits and organizational goals



Centralizing administ
ration with the VMM console



Integrating VMM with other System Center components



Augmenting functionality with add
-
ons and extensions



Accelerating VM deployments



Deploying VMs from predefined templates



Standardizing hardware and OS settings with profiles



Converting existing physical servers with P2V tools



Migrating from competing virtualization platforms



Centralizing performance management



Collecting data from the virtual infrastructure



Limiting CPU and memory consumption



Automating load distribution with
Dynamic Optimization


Securing the Virtual Environment



Ensuring data protection



Assessing parent and guest initiated backups



Identifying required backup application features



Minimizing security risks



Reducing the potential for malware and other attacks



Del
egating control through the AppController web portal


PMP


5 days

Introduction



Managing the project processes and issues



Creating a realistic and achievable project plan



Working within project constraints


Launching Your Project



Applying a project
framework for success



Managing the key inputs and outputs



Balancing typical challenges of project management



Selecting and applying best practices



Core project leadership skills



Building and managing team effectiveness



Taking responsibility for the team
culture



Building a project charter



Defining clear project objectives



Determining and clarifying the goals



Defining key project deliverables



Gaining buy
-
in from stakeholders


The Six
-
Step Planning Method



Defining the project workload



Determining project sco
pe with work breakdown structures (WBS)



Driving the plan down to manageable task level



Calculating a first cut of project costs



Building high
-
confidence estimates



Effective ways to produce better estimates



Differentiating between work, duration and resourc
es



Leveraging three
-
point estimating to refine accuracy



Managing the estimating process



Scheduling the project



Converting WBS to precedence networks



Determining the critical path tasks



Creating dependency diagrams



Calculating the project duration



Creating
the project timeline



Building clear and readable Gantt charts



Using slack effectively in the schedule



Setting key milestones to track and control the project



Developing a risk management process



Identifying the project risks and assumptions



Evaluating risk

impacts



Strategies for managing risks



Managing key risks with the Risk Register



Reducing risks through contingency plans



Effectively matching resources to work



Identifying the resources your project needs



Assigning resources to tasks



Analyzing resource us
e and costs in the schedule



Optimizing the use of resources



Preparing and agreeing on task contracts


Running the Project



Establishing an effective control process



Establishing change control procedures



Presenting the project plan for approval



Setting the
baseline schedule



Implementing the plan



Monitoring real task progress



Analyzing progress against the baseline



Picking up warnings of trouble ahead



Engaging team members to maximize productivity



Tracking and reporting progress



Tracking planned vs. actual ta
sk performance



Analyzing the impact of variation to the baseline



Crashing the critical path tasks



Implementing, correcting and optimizing strategies to achieve project objectives



Leading throughout the project life cycle



Communicating project status to sta
keholders



Coping with common project scenarios



Building ownership, motivation and commitment across the team


Successful Project Closure



Managing systematic project closedown



The payoff of post
-
implementation review



Documenting project and personal lessons

learned