Basic Level
Courses: Switching, Routing, Cloud, Security, Window OS
Networking
–
Switching & Routing (3 days each topic)
Identifying Data Network Operation
-
Introduction
Distinguishing the purposes and functions of various network devices
Selecting the
components required to meet a network design
Applying the OSI and TCP/IP models to troubleshoot a network
Describing common network applications
Inspecting operation of protocols in OSI and TCP models
Examining IP and its functionality
Identifying the use
of reliable vs. unreliable protocols
Assessing the bandwidth impact of Voice over IP
Explaining the operation of Cisco switches and switching concepts
-
Switching
Performing initial switch configuration tasks and enabling remote access
Verifying switch
operation using the IOS basic command
-
line
Implementing and verifying port security to prevent intrusions
Identifying and resolving network media issues
Configuring, Verifying and Troubleshooting VLANs and Interswitch Communications
-
Switching
Identifyin
g enhanced switching technologies
Designing VLANs to logically separate networks
Implementing trunking on Cisco switches to link domains
Troubleshooting interVLAN routing issues using the CLI
Configuring, verifying and troubleshooting Spanning Tree operati
on
Enabling Rapid Spanning Tree protocol to enhance fault tolerance
Interpreting SHOW and DEBUG commands to verify the status of a switched network
Implementing switch security to prevent intrusions and eavesdropping
Implementing an IP Addressing Scheme
-
Switching
Designing a VLSM addressing scheme
Applying design concepts to manage addressing in a medium
-
sized network
Creating a classless addressing scheme using VLSM and route summarization
Diagnosing and correcting common problems associated with IP add
ressing
Integrating IPv6 in your organization
Recognizing the IPv6 address space and its new features
Verifying the requirements for running IPv6
Implementing compatibility with IPv4 networks using dual stacks and tunneling
Evaluating and troubleshooting LAN/WAN connectivity
-
Switching
Implementing static and dynamic addressing services
Identifying and correcting IP addressing issues
Enabling Routing in a Small Network
–
Switching & Routing basics
Evaluating routing
concepts and protocols
Inspecting the operation of Cisco the bootup process
Verifying network status and router operation using the CLI
Selecting the appropriate media and connectors
Configuring and verifying routing using RIPv2
Configuring and
Troubleshooting Routing on Cisco Devices
-
Routing
Reviewing Distance
-
Vector and Link State routing protocols
Evaluating methods of routing and routing protocols
Configuring and verifying OSPF and EIGRP routing
Troubleshooting routing issues using SHOW and
DEBUG commands
Configuring the router using the CLI
Inspecting the operation status of a device and its interfaces
Verifying device configuration and network connectivity
Reconfiguring routing with static routing
Managing IOS configuration
Displaying and
changing Cisco IOS boot options
Implementing password and physical security
Implementing and Troubleshooting NAT and ACLs in a Medium
-
Sized Network
-
Routing
Enhancing security with Access Control Lists (ACLs)
Describing the purpose and types of ACLs and
their role in securing network traffic
Applying ACLs based on network policy requirements
Verifying and monitoring ACLs in a network environment using the CLI
Troubleshooting and correcting ACL implementation issues
I
mplementing Network Address Translation
(NAT)
Explaining the basic operation of NAT and PAT to increase security and conserve addresses
Configuring NATs using the CLI and SDM
Identifying and correcting NAT implementation issues
Implementing and Verifying WAN Links
-
Routing
Reviewing
encapsulation methods for connecting to a WAN
Enabling authentication for secure WAN connections
Configuring and verifying routed WAN connections
Cloud Computing (
3 days
)
Introduction to Cloud Computing
Defining cloud computing
Components of a computing
cloud
Differentiating types of clouds: public, private, hybrid
D
rivers of cloud computing solutions
Memory
Processing
Storage
Network
Infrastructure as a Service (IaaS)
Introduction to IaaS
Accessing IaaS
Provisioning servers on demand
Handling dynamic
and static IP addresses
Tools and support for management and monitoring
Security, availability and disaster recovery strategies
CompTIA Security+
(3 days)
Introduction to General Security Concepts
InfoSec Overview and History
Access Control
Authentication
Non
-
Essential Services/Systems/Protocols
Attacks
Malicious Code
Social Engineering
Auditing
Communication, Infrastructure Security
Remote Access
Email
Web
Directory
File Transfer
Wireless
Devices
Media
Security Topologies
Intrusion
Detection
Security Baselines
Operational/Organizational Security
Standards and Protocols
Key Management/Certificate Lifecycle
Suspension
Recovery
Renewal
Destruction
Key Usage
Physical Security
Disaster Recovery
(basic)
Policy and Procedures
Privilege
Management
Risk Identification
Windows OS Management & Overview
(3 days)
Operating System Overview
Benefits of upgrading to Windows Server 2008
Analyzing and implementing the features
Installing and Upgrading Servers
Selecting the appropriate deployment
method
Multiple Activation Key
Key Management Server
Adding and configuring server roles and features
Service packs and H
otfixes
What is
Active Directory
Active Directory Domain Services (AD DS)
Domain Controllers
Organizational Units, users and groups
U
ser account properties and profiles
introduction
Managing
resource access with role
-
group
Configuring and Managing the System
Event Viewer
Device Manager
Windows Firewall
Centralizing events from multiple server event logs
Introducing PowerShell for admin
istrative tasks
Reliability Monitor
Troubleshooting the OS with Windows Recovery Disk
Managing disks, full backup and restore
What is
Master Boot Record (MBR)
GUID Partition Table (GPT)
Saving the system and data with Windows Server Backup
Inherited vs.
explicit Access Control Entries
Controlling Network Components and Services
Managing network settings
Configuring the Network and Sharing Center
Integrating IPv4 and IPv6 protocols
Sharing resources across the network
Recovering with Shadow Copies and Prev
ious Versions
Increasing file access responsiveness with BranchCache
File Server Resource Manager (FSRM)
Creating quotas based on prebuilt templates
Filtering extraneous files with screening technologies
Administering the Active Directory
Distributing and
delegating administrative power
Allocating responsibilities for simplified administration
Configuring environments with Group Policies
Identifying common settings with the Group Policy Management Console (GPMC)
Deploying Remote Desktop Services (RDS)
Intermediate Level
Courses:
Switching, Routing, Storage, Cloud, Security, Operati
on & Maintenance, B
uilding Management
System (BMS)
, Enterprise Operation Control (EOC)
CCNP
–
Switching, Routing
(3 days each topic)
ROUTE/Testing
-
Routing
Understand
Fundamental Routing Operations
Implement EIGRP Operations
Implement Multi
-
area OPSF Operations
Implement IPv6 Routing
Implement eBGP for Enterprise Connectivity
Implement Route Distribution
Implement Layer 3 Path Control Solutions
SWITCH/Testing
–
Switching
Implement VLANs/VTP
S
ecure VLANs
Conduct the Operation of Spanning Tree Protocols in a Hierarchical Network
Layer 3 Switching
Configure Support for Advanced Services (Voice, Video, Wireless)
Describe Wireless Client Access
Implement High Availab
ility
T
rooubleshooting/
Testing
–
EOC Functions
Troubleshoot Routing Protocols
Troubleshoot Routing Redistribution
Troubleshoot IPv6
Troubleshoot VLANs
ITroubleshoot Switch Security
Troubleshoot VoIP and Video
Storage System (3 days)
Introduction to
information storage
Data center environments
RAID
Intelligent storage system
Storage Networking Technologies
Disks and intelligent storage systems
RAID levels
SAN components and terminology
NAS components and terminology
Storage system features used in ba
ckup and recovery
Replication and continuous data protection technologies
Fibre Channel SAN (FC SAN)
IP SAN and FCoE
Network attached storage (NAS)
Object based and unified storage
Backup, Archive,
and Replication
Backup concepts and terms
Generic backup
architecture
Introduction to business continuity
Backup and archive
Local replication
Remote replication
Management of Storage
Securing storage infrastructure
Managing storage infrastructure
C
loud Computing
–
3 days
Cloud Computing
Components of a
computing cloud
Differentiating types of clouds: public, private, hybrid
Identifying private cloud technologies
Categorizing service types
Comparing vendor cloud products: Amazon, Google, Microsoft and others
Improving utilization with virtualization
Choosing para
-
or hardware
-
assisted virtualization
Utilizing cores and hyperthreading
Calculating performance with EC2 Compute Units (ECU)
Comparing virtualization and cloud computing
Deploying an On
-
Site Private Cloud
Identifying architectural components
of Eucalyptus
Analyzing compatibility with A
mazon
W
eb
S
ervices (AWS)
Deploying a Proof of Concept (POC) installation
Isolating instances with VLANs
Controlling access with security groups
Assigning virtual addresses to instances
Providing automatic High A
vailability (HA)
Managing a Eucalyptus private cloud
Customizing Eucalyptus Machine Images (EMI)
Launching and connecting to instances with key pairs
Interconnecting public, private and community clouds
Handling excess demand with cloud bursting
Evolving
to hybrid clouds
Exploiting the advantages of hybrid clouds
Examining Hybrid Cloud Use Cases
Considering alternative private cloud solutions
Evaluating a scorecard of leading private cloud offerings
VMware vCloud
Hyper
-
V
CCNP
-
Security (3 days
)
This
course is intended for those with at least one year of networking experience and valid CCNA and CCDA
certifications.
Advanced IP addressing and routing in implementing scalable and secure Cisco ISR routers connected to LANs
and WANs
Secure routing solutio
ns
Plan, configure and verify the implementation of complex enterprise switching solutions using
Cisco’s Campus Enterprise Architecture
Secure integration of VLANs, WLANs, voice and video into campus networks
Plan and perform regular maintenance on complex
enterprise routed and switched networks
Using technology
-
based practices and a systematic ITIL
-
compliant approach to perform network
troubleshooting
Network infrastructure and design
Intelligent network services
Converged network solutions
Securing
Networks with Cisco Routers and Switches
Implementing Cisco Intrusion Prevention System v7.0
Deploying Cisco ASA Firewall Solutions
Deploying Cisco ASA VPN Solutions
Implementing Cisco IOS Network Security
Securing Networks with Cisco Routers and Switches
Deploying Cisco ASA Firewall Solutions
Deploying Cisco ASA VPN Solutions
Implementing Cisco Intrusion Prevention Systems
Additional
Security
Course
(
3
day)
Building a Secure Organization
Real threats that impact
cybersecurity
Hackers inside and out
Eavesdropping
Spoofing
Sniffing
Trojan horses
Viruses
Defining your information assurance objectives
Assessing your exposure
Verifying User and Host Identity
Assessing traditional static password schemes
Creating a good quality password policy to prevent
password guessing and cracking
Protecting against social engineering attacks
Encrypting passwords to mitigate the impact of password sniffing
Evaluating strong authentication methods
Preventing password replay using one
-
time and tokenized passwords
What is
two
-
factor authentication
Authenticating hosts
Shortcomings of IP addresses
Address
-
spoofing issues and countermeasures
Solutions for wireless networks
Preventing System Intrusions
Discovering system vulnerabilities
Searching for operating system vulnera
bilities
Discovering file permission issues
Limiting access via physical security
Encrypting files for confidentiality
Encryption with application
-
specific tools
Recovering encrypted data
Hardening the operating system
Locking down user accounts
Securing
administrator's permissions
Protecting against viruses
Guarding Against Network Intrusions
Scanning for vulnerabilities
Restricting access to critical services
Preventing buffer overflows
Reducing denial
-
of
-
service (DoS) attacks
Securing DNS
Limiting the
impact of common attacks
Deploying firewalls to control network traffic
Contrasting firewall architectures
Preventing intrusions with filters
Implementing cyber security policy
Building network firewalls
Evaluating firewall features
Selecting an architectu
re and a personal firewall
Ensuring Network Confidentiality
Mitigating threats from connected hosts
Partitioning the network to prevent data leakage
Identifying wireless LAN vulnerabilities
Securing data
-
link layer with PPTP and L2TP
Cryptography/Operational/Organizational Security
Algorithm
Concepts of Using Cryptography
PKI
Standards and Protocols
Key Management/Certificate Lifecycle
Suspension
Recovery
Renewal
Disaster Recovery
Business Continuity
Policy and Procedures
Forensics
Risk Identification
Operations and
M
aintenance
(O&M)
Functions
–
3 days
Introduction to
Environments
Upgrading the existing operating system
Enabling servers with volume license activation
Updating and maximizing security with WSUS
Leveraging the
multi
-
server Server Manager
Installing roles/features with the Dashboard
Setting up Windows Server Core
Performing administrative tasks with PowerShell
Constructing
and Administrating
Active Directory (AD)
Active Directory infrastructure components
Organi
zing with forests, domains and sites
Raising domain and forest functional levels
Locating and transferring Flexible Single
-
Master Operation (FSMO) roles
Migrating existing domains to Windows Server 2012
Building Domain Controllers (DCs) to host the AD
Configuring DNS and managing DC Replication
Creating objects with the GUI and PowerShell
Simplifying administration with group nesting
Generating users, groups and OUs with PowerShell
Analyzing the AD with the Administrative Center
Maintaining and
Protect
ing
Disk &
File System Resources
Backing up, restoring and organizing disks
Enabling disaster recovery with Windows Server Backup
Maximizing protection with cloud
-
based Online Backup
Increasing resilience with storage pools and spaces
Optimizing disk space
with Data Deduplication
Creating and attaching VHD and VHDX virtual disks
Defining security on files and folders
Adjusting User Account Control notification levels
Limiting access with custom Access Control Lists (ACLs)
Auditing file system objects for
specific troubleshooting
Specifying claims and tags for Dynamic Access Control
Managing and Troubleshooting Servers
Exploiting administrative tools and applets
Action Center
Task Scheduler
Performance Alerts
using Enterprise Monitoring tool
iSCSI initiato
r
Configuring the Windows Firewall for remote access
Measuring reliability and analyzing performance
Producing diagnostic reports with Data Collector Sets
Determining recurrent issues with Reliability Monitor
Fixing startup issues with the Recovery
Environment
Administering the Active Directory
Assigning administrative rights
Analyzing results from the Best Practices Analyzer (BPA)
Delegating control for seamless administration
Deploying Group Policies for central management
Contrasting computer/use
r policies and preferences
Locking down the desktop with administrative templates
Building Automation Systems
Building Management System
–
Day 2 Training
(3 days)
Introduction to the Refrigeration Cycle
Understanding the Components of an A/C system
Understanding Fixed Air Volume & Variable Air Volume Applications
Understanding Psychrometry
Understanding Input & Outputs
Introduction to Sensors, Actuators, Input Devices, Output Devices & Logic statements, PID Loops
Building Utility Management & Control
Strategy
Point Scheduling & I/O Summary
Integration
Fire, Moisture Detection & Alarm System
Fire Lifecycle
Detection Technologies
Fire Panel Technologies
I
nput / Output Devices
Detector & Device Wiring Schema
Moisture sensors
Fireman's Telephony &
Talkback system
Fire Safety Strategies
Electronic Physical Security (Access Control System)
Access Control systems
Access Control Technologies
Data Encryption & Security
Access Control Strategy
Access Controllers
Biometrics
Barriers
Reporting &
Operations
Electronic Physical Security (Access Control System)
Introduction to Optics in Cameras
Types of Camera Technologies
Integration
Gas Suppression System
Introduction to Clean Agent Fire Retardants
Types of Clean Agents
Type of Application
Car
bon Dioxide
FM 200 or NAF227
Enterprise Operating Center
(EOC)
Troubleshooting
& Information Technology Information Library
(ITIL)
(
3 days)
Service operation and the overall ITIL lifecycle
Principles and objectives
Functions and common activities
How
service operation creates business value
Balancing conflicting goals
Internal IT vs. external business view
Stability vs. responsiveness
Quality of service vs. cost of service
Reactive and proactive activities
Core Service Operation Processes
Policies, pri
nciples and basic concepts
Purpose and objectives
Incident Review, and Escalation procedure
Value to business
Process activities, methods and techniques
Triggers, inputs, outputs and interfaces
Challenges and risks
Primary ITIL processes within service
operation
Event management: active and passive monitoring
Restoring normal service quickly through incident management
Request fulfillment
Managing problems with root cause analysis
Access management
Common Service Operation Activities
Monitoring and
control of IT operations
Detecting the status of services and CIs
Taking appropriate corrective action
Console management/operations bridge: a central coordination point for monitoring and managing services
Management of the infrastructure
Mainframe, serve
r and network management
Storage and database administration
Managing directory services and desktop support
Facilities and datacenter management
Improving operational activities
Operational aspects from other lifecycle phases
Change, configuration and rel
ease
Availability
Capacity
Service continuity
Organizing for Service Operation
Mapping service operation functions to activities
Roles and responsibilities
Understanding the organizational context
Service operation structure
Service desk
Technical
management
IT operations management
Application management
Key functions of the service desk
Logging incidents and requests
First
-
line investigation and diagnosis
Managing the lifecycle of incidents and requests
Keeping users informed
Structuring the servi
ce desk
Local vs. centralized
The virtual service desk
Follow the sun operation
Technology
-
Related Issues
Technology, tools and expertise requirements
Defining architecture standards
Involvement in the design and build of new services and operational pract
ices
Contributing to service design, service transition and continual service improvement projects
Evaluating change requests
Matching technology to the organizational situation
Implementation Challenges and Risks
Managing change in service operation
Servi
ce operation and project management
Assessing and managing risk
Operational staff in design and transition
Planning service management technologies
Identifying critical success factors (CSFs)
Advanced Level
Courses:
Routing & Switching,
Security
, Hyper
-
V, Security, Windows Enterprise
Server,
Cloud
Migration
, PMP
C
CIE
–
Routing & Switching
(5 day
per topic
)
Week 1 T
opics
Include
(5 days)
Bridging and Switching
Trunking & Etherchannel
VTP and VLANs
STP, RSPT and MSTP
QinQ Tunneling
Advanced Spanning Tree
Features
Storm
-
Control
Private VLANs
Additional Catalyst Security Features
SPAN and RSPAN
Catalyst 3560 Troubleshooting
F
rame
-
Relay Features
Frame
-
Relay Switching
Frame
-
Relay Troubleshooting
PPP, PPPoFR and PPPoE
PPP Authentication and Advanced PPP
Features
PPP Troubleshooting
Additional Layer 2 Technologies
Layer 2 Troubleshooting
IGP Routing
OSPF Configuration
Advanced OSPF: Area Types, Summarization, Authentication, Virtual
-
Links, etc.
EIGRP Configuration
Advanced EIGRP: Authentication, Summariza
tion, Metric Tuning, etc.
RIP Configuration
Advanced RIP: Timers Tuning, Authentication, Summarization, etc.
R
oute Redistribution
Additional IGP
-
Related Topics
General Routing Troubleshooting (RIP, EIGRP, OSPF)
Advanced OSPF Troubleshooting
Advance
d EIGRP Troubleshooting
IGP Troubleshooting
BGP
BGP Configuration
BGP Router Reflectors and Confederations
Route Aggregation
Community Signaling
BGP Best Path Manipulation: AS_PATH, Local Pref, Other Attributes
Route Filtering Features
Advanced BGP:
Conditional Advertisement, ORF, etc.
Additional BGP Features
Advanced BGP Troubleshooting
MPLS VPN
MPLS LDP
MP
-
BGP VPNv4
Route Target Filtering
PE
-
CE Routing: OSPF and RIP
Inter
-
site connectivity
Advanced Features: Summarization, Internet Access, etc.
MPLS and MPLS VPN Troubleshooting
Week 2 Topics Include
(5 days)
IPv6
Addressing and Tunneling
R
outing: RIPng, OSPFv3 and EIGRPv6
Advanced OSPFv3 Features: Area types, Summarization, etc.
OSPFv3 Troubleshooting
Additional IPv6
-
related Topics
IPv6
Troubleshooting
IPv4 and IPv6 Multicast
PIM Sparse and Dense Mode
Auto
-
RP and BSR
RP Filtering Techniques
PIM and IGMP Access Control
RPF Failures
Tunneling Multicast Traffic
P
IM over NBMA Networks
Interdomain Multicast (MSDP)
Additional Multicast Feature
s
Basic and Advanced Multicast Troubleshooting
QoS
QoS DiffServ and InterServ Theory
Understanding Policing and Shaping
Queueing Techniques: Legacy and CBWFQ/HQF
Congestion Management Techniques
Frame
-
Relay Traffic Shaping (Legacy and MQC)
Resource
Reservation Protocol (RSVP)
Understanding SRR, WRR, DWRR Theory
Catalyst 3560 SRR (Shaped and Shared)
Catalyst 3560 QoS: Queueing and Policing
Catalyst 3560 Port and VLAN Based QoS
Security
Access
-
Lists in Routers and Switches
CBAC Feature Set
Zone
-
Based
Firewall
TCP Intercept
Managing Router Access: Privilege levels, RBAC
Additional Security Topics
IP Services
First Hop Redundancy Services: HSRP, GLBP, VRRP
IOS Features: Menus, HTTP server, DHCP etc
Management Features: SNMP and RMON
NAT
SLA and Object
Tracking
OER/PfR
Embedded Event Manager (EEM)
Additional IP Services
T
roubleshooting
CISSP
–
Security (
5 day course)
Access Control
A
collection of mechanisms that work together to create a security architecture to protect the assets of the
information sy
stem.
Access Control Concepts
Concepts/Methodologies/Techniques
Attacks
Effectiveness
Telecommunications and Network Security
Discusses network structures, transmission methods, transport formats and security measures used to provide
availability,
integrity and confidentiality.
Telecommunications and Network Security Concepts
Network architecture and design
Network components
Communication channels
Network attacks
Information Security Governance and Risk Management
The identification of an organiza
tion’s information assets and the development, documentation and
implementation of policies, standards, procedures and guidelines.
Info Sec Governance and Risk Management Concepts
Security governance and policy
Risk management concepts
Personnel security
Information classification/ownership
Contractual agreements and procurement processes
Security education, training and awareness
Certification and accreditation
Cryptography
The principles, means and methods of disguising information to ensure its integri
ty, confidentiality and
authenticity.
Cryptography Concepts
Encryption concepts
Public Key Infrastructure (PKI)
Digital signatures
Information hiding alternatives
Cryptanalytic attacks
Security Architecture and Design
Contains the concepts, principles, st
ructures and standards used to design, implement, monitor, and secure,
operating systems, equipment, networks, applications, and those controls used to enforce various levels of
confidentiality, integrity and availability.
Security Architecture and Design
Concepts
Fundamental concepts of security models
Countermeasure principles
Capabilities of information systems (e.g. memory protection, virtualization)
Vulnerabilities and threats (e.g. cloud computing, aggregation, data flow control)
Operations Security
Used to identify the controls over hardware, media and the operators with access privileges to any of these
resources.
Operations Security Concepts
Resource protection
Attack prevention and response
Incident response
Patch and vulnerability management
Bus
iness Continuity and Disaster Recovery Planning
Addresses the preservation of the business in the face of major disruptions to normal business operations.
Business Continuity and Disaster Recovery Concepts
Business impact analysis
Disaster recovery process
Recovery strategy
Provide training
Legal, Regulations, Investigations and Compliance
Addresses computer crime laws and regulations; the investigative measures and techniques which can be used
to determine if a crime has been committed and methods to gath
er evidence.
Legal, Regulations, Investigations and Compliance Concepts
Legal Issues
Forensic procedures
Investigations
Compliance requirements/procedures
Physical (Environmental) Security
Addresses the threats, vulnerabilities and countermeasures that ca
n be utilized to physically protect an
enterprise’s resources and sensitive information.
Physical (Environmental) Security Concepts
Site/facility design considerations
Internal security
Perimeter security
Facilities security
Windows Enterprise Server
-
Employing Administration Tools
(5 days)
Managing the server
Installing roles with Server Manager
Configuring functionality with PowerShell
Enabling remote administration
Identifying barriers to remote management
Employing Group Policies to overcome issues
Implementing Windows Remote Management
Tuning the Windows Firewall
Making use of Server Manager groups
Administering with PowerShell
Managing Local and Remote Servers
Leveraging the scripting capabilities of PowerShell
Deploying Server Core
Reviewing
the features and benefits of Server Core
Preparing for a production environment
Administering the core remotely
Determining the most effective scenario for deployment
Securing Windows Server 2012
Defining security components
Analyzing role
-
based security
Testing Dynamic Access Control
Safeguarding the server with the Windows Firewall
Building security policies
Documenting server security
Composing optimal Group Policies
Auditing the server
Diagnosing security issues
Creating an audit trail
Filtering the
security log
Optimizing Server Performance
Assessing workloads
Balancing applications and server roles
Evaluating hardware and software components
Reconfiguring the operating system
Monitoring server performance
Analyzing system behavior with Resource
Monitor
Establishing baselines with Performance Monitor
Designing Data Collector Sets
Detecting and resolving performance concerns
Identifying Performance Monitor counters
Solving the challenge of memory leaks
Exploring the effect of services on server pe
rformance
Troubleshooting Windows Server 2012
Recovering from boot process failures
Breaking down the pre
-
Windows boot process
Appraising the Windows load sequence
Selecting the appropriate recovery environments
Booting to the recovery console
Leveraging
WinRE to correct the problem
Repairing key Windows components
Maintaining a stable registry
Managing service accounts and privileges
Identifying faulty drivers
Solving network issues
Extracting information from the Event Viewer
Collecting events from re
mote servers
Attaching subscriptions to selected events
Implementing a High
-
Availability Environment
Clustering Windows servers
Meeting failover clustering requirements
Recognizing the role of Quorums
Virtualizing servers
Increasing scalability potential
with Hyper
-
V
Speeding up recovery with replicas
Maintaining high availability with live migration
Hyper
-
V
(
3
days)
Preparing a Hyper
-
V Environment
Introduction to virtualization
Investigating Type I and Type II hypervisors
Validating the hardware and
software prerequisites
Comparing Hyper
-
V to VMware and Xen offerings
Implementing Hyper
-
V
Enabling the server role
Leveraging management interfaces
Building Virtual Machines (VMs)
Configuring the virtual hardware
Allocating CPU resources
Distributing stat
ic and dynamic memory
Connecting to removable hardware
Architecting the storage fabric
Constructing dynamic and fixed
-
sized virtual hard disks
Increasing performance with pass
-
through disks
Reverting system state with snapshots
Converting, compressing and
expanding VHDs
Creating virtual networks
Optimizing network performance
Implementing external, internal and private switches
Optimizing and Troubleshooting
Monitoring the virtual infrastructure
Exploiting the Best Practices Analyzer (BPA) results
Inspecti
ng live parent and child performance data
Gathering hypervisor metrics through Performance Monitor
Detecting and resolving issues
Examining and filtering event logs
Triggering alerts for efficient remediation
Controlling resource usage
Relocating Virtual
Machines and Disks
Transferring backend data
Importing and exporting virtual machines
Performing online storage migrations
Redistributing Hyper
-
V workloads with live migrations
Migrating locally stored VMs between hosts
Optimizing migrations with Storage A
rea Networks (SANs)
Increasing Service and Application Availability
Eliminating single points of failure
Avoiding network outages with NIC teaming
Mirroring VMs in real time with Hyper
-
V replicas
Improving fault tolerance with failover clusters
Monitoring
cluster resources and VM states
Configuring appropriate quorum models
Expediting live migration with clustering
System Center Virtual Machine Manager (SCVMM)
Establishing a private cloud
Correlating benefits and organizational goals
Centralizing administ
ration with the VMM console
Integrating VMM with other System Center components
Augmenting functionality with add
-
ons and extensions
Accelerating VM deployments
Deploying VMs from predefined templates
Standardizing hardware and OS settings with profiles
Converting existing physical servers with P2V tools
Migrating from competing virtualization platforms
Centralizing performance management
Collecting data from the virtual infrastructure
Limiting CPU and memory consumption
Automating load distribution with
Dynamic Optimization
Securing the Virtual Environment
Ensuring data protection
Assessing parent and guest initiated backups
Identifying required backup application features
Minimizing security risks
Reducing the potential for malware and other attacks
Del
egating control through the AppController web portal
PMP
–
5 days
Introduction
Managing the project processes and issues
Creating a realistic and achievable project plan
Working within project constraints
Launching Your Project
Applying a project
framework for success
Managing the key inputs and outputs
Balancing typical challenges of project management
Selecting and applying best practices
Core project leadership skills
Building and managing team effectiveness
Taking responsibility for the team
culture
Building a project charter
Defining clear project objectives
Determining and clarifying the goals
Defining key project deliverables
Gaining buy
-
in from stakeholders
The Six
-
Step Planning Method
Defining the project workload
Determining project sco
pe with work breakdown structures (WBS)
Driving the plan down to manageable task level
Calculating a first cut of project costs
Building high
-
confidence estimates
Effective ways to produce better estimates
Differentiating between work, duration and resourc
es
Leveraging three
-
point estimating to refine accuracy
Managing the estimating process
Scheduling the project
Converting WBS to precedence networks
Determining the critical path tasks
Creating dependency diagrams
Calculating the project duration
Creating
the project timeline
Building clear and readable Gantt charts
Using slack effectively in the schedule
Setting key milestones to track and control the project
Developing a risk management process
Identifying the project risks and assumptions
Evaluating risk
impacts
Strategies for managing risks
Managing key risks with the Risk Register
Reducing risks through contingency plans
Effectively matching resources to work
Identifying the resources your project needs
Assigning resources to tasks
Analyzing resource us
e and costs in the schedule
Optimizing the use of resources
Preparing and agreeing on task contracts
Running the Project
Establishing an effective control process
Establishing change control procedures
Presenting the project plan for approval
Setting the
baseline schedule
Implementing the plan
Monitoring real task progress
Analyzing progress against the baseline
Picking up warnings of trouble ahead
Engaging team members to maximize productivity
Tracking and reporting progress
Tracking planned vs. actual ta
sk performance
Analyzing the impact of variation to the baseline
Crashing the critical path tasks
Implementing, correcting and optimizing strategies to achieve project objectives
Leading throughout the project life cycle
Communicating project status to sta
keholders
Coping with common project scenarios
Building ownership, motivation and commitment across the team
Successful Project Closure
Managing systematic project closedown
The payoff of post
-
implementation review
Documenting project and personal lessons
learned
Enter the password to open this PDF file:
File name:
-
File size:
-
Title:
-
Author:
-
Subject:
-
Keywords:
-
Creation Date:
-
Modification Date:
-
Creator:
-
PDF Producer:
-
PDF Version:
-
Page Count:
-
Preparing document for printing…
0%
Comments 0
Log in to post a comment