MCSA Training in Bangalore

  • mcsa
  • Trainer

  • Category

  • Review

  • mcsa

MCSA Course

MCSA (Microsoft Certified Solutions Associate) is a certification program intended for people who seek entry-level jobs in an IT (information technology) environment. MCSA is a prerequisite for more advanced Microsoft certifications

MCSA Course Ingredients

1.stalling and Configuring Windows Server 2012
2.Administering windows server 2012
3.Configuring Advanced Windows Server 2012 Services

MCSA Roles & Responsibilities:fication:

1.Network Administrators
2.Cloud Architects
3.Systems Administrators
4.Cloud Administrators

Course Content

Total hours:60 Hours

  • Deploying and Managing Windows Server 2012

  • 1. Windows Server 2012 Overview

  • 2.Overview of Windows Server 2012 Management

  • 3.Installing Windows Server 2012

  • 4.Post-Installation Configuration of Windows Server 2012

  • 5.Introduction to Windows PowerShell

  • Introduction to Active Directory Domain Services

  • 1.Overview of AD DS

  • 2.Overview of Domain Controllers

  • 3.Installing a Domain Controller

  • Managing Active Directory Domain Services Objects

  • 1.Managing User Accounts

  • 2.Managing Group Accounts

  • 3.Managing Computer Accounts

  • 4.Delegating Administration

  • Automating Active Directory Domain Services Administration

  • 1.Using Command-line Tools for Administration

  • 2.Using Windows PowerShell for Administration

  • 3.Performing Bulk Operations with Windows PowerShell

  • Implementing IPv4

  • 1.Overview of TCP/IP

  • 2.Understanding IPv4 Addressing

  • 3.Subnetting and Supernetting

  • 4.Configuring and Troubleshooting IPv4

  • Implementing DHCP

  • 1.Installing a DHCP Server Role

  • 2.Configuring DHCP Scopes

  • 3.Managing a DHCP Database

  • 4.Securing and Monitoring DHCP

  • Implementing DNS

  • 1.Name Resolution for Windows Client and Servers

  • 2.Installing and Managing a DNS Server

  • 3.Managing DNS Zones

  • Implementing IPv6

  • 1.Overview of IPv6

  • 2.IPv6 Addressing

  • 3.Coexistence with IPv6

  • 4.IPv6 Transition Technologies

  • Implementing Local Storage

  • 1.Overview of Storage

  • 2.Managing Disks and Volumes

  • 3.Implementing Storage Spaces

  • Implementing File and Print Services

  • 1.Securing Files and Folders

  • 2.Protecting Shared Files and Folders Using Shadow Copies

  • 3.Configuring Network Printing

  • Implementing Group Policy

  • 1.Overview of Group Policy

  • 2.Group Policy Processing

  • 3.Implementing a Central Store for Administrative Templates.

  • Securing Windows Servers Using

  • 1.Group Policy Objects

  • 2.Windows Security Overview

  • 3.Configuring Security Settings

  • 4.Restricting Software

  • 5.Configuring Windows Firewall with Advanced Security

  • Implementing Server Virtualization with Hyper-V

  • 1.Overview of Virtualization Technologies

  • 2.Implementing Hyper-V

  • 3.Managing Virtual Machine Storage

  • 4.Managing Virtual Networks

  • Deploying and Maintaining Server Images

  • 1.Overview of Windows Deployment Services

  • 2. Deployment with Windows Deployment Services

  • 3.Administering Windows Deployment Services

  • Configuring and Troubleshooting Domain Name System

  • 1. Installing the DNS Server Role

  • 2.Configuring the DNS Server Role

  • 3. Configuring DNS Zones

  • 4.Configuring DNS Zone Transfers

  • 5.Managing and Troubleshooting DNS

  • Maintaining Active Directory Domain Services

  • 1.Overview of AD DS

  • 2.Implementing Virtualized Domain Controllers

  • 3.Implementing RODC

  • 4. Administering AD DS

  • 5.Managing the AD DS Database

  • Managing User and Service Accounts

  • 1.Automating User Account Management

  • 2.Configuring Password-Policy and User-Account Lockout Settings

  • 3.Configuring Managed Service Accounts

  • Implementing a Group Policy Infrastructure

  • 1.Introducing Group Policy

  • 2.Implementing and Administering Group Policy Objects (GPOs)

  • 3.Group Policy Scope and Group Policy Processing

  • 4.Troubleshooting the Application of GPOs

    Managing User Desktops with Group Policy

  • 1.Implementing Administrative Templates

  • 2.Configuring Folder Redirection and Scripts

  • 3.Configuring Group Policy Preferences

  • 4.Managing Software with Group Policy

    Configuring and Troubleshooting Remote Access

  • 1.Configuring Network Access

  • 2.Configuring Virtual Private Network (VPN) Access

  • 3.Overview of Network Policies

  • 4.Troubleshooting Routing and Remote Access

  • 5.Configuring DirectAccess

  • 1.Automating User Account Management

  • 2.Configuring Password-Policy and User-Account Lockout Settings

  • 3.Configuring Managed Service Accounts

  • Installing, Configuring, and Troubleshooting the Network Policy Server Role

  • 1.Installing and Configuring a NPS

  • 2.Configuring Remote Authentication Dial-In User Service (RADIUS) Clients and Servers

  • 3.NPS Authentication Methods

  • 4.Monitoring and Troubleshooting a NPS

  • Managing User Desktops with Group Policy

  • 1.Implementing Administrative Templates

  • 2.Implementing Network Access Protection

  • 3.Overview of Network Access Protection

  • 4.Overview of NAP Enforcement Processes

  • 5.Configuring NAP

  • 6.Monitoring and Troubleshooting NAP

  • Optimizing File Services

  • 1.Overview of FSRM

  • 2.Using FSRM to Manage Quotas, File Screens, and Storage Reports

  • 3.Implementing Classification and File Management Tasks

  • 4.Overview of Distributed File System (DFS)

    5.Configuring DFS Namespaces

  • 6.Configuring and Troubleshooting Distributed File System Replication (DFS-R)

  • Configuring Encryption and Advanced Auditing

  • 1.Encrypting Files by Using Encrypting File System

    2.Configuring Advanced Auditing

  • Implementing Update Management

  • 1.Overview of WSUS

  • 2.Deploying Updates with WSUS

  • Monitoring Windows Server 2012

  • 1.Monitoring Tools

  • 2.Using Performance Monitor

  • 3.Monitoring Event Logs

  • Implementing Advanced Network Services

  • 1.Implementing Advanced Network Services

  • 2.Configuring Advanced DHCP Features

  • 3.Configuring Advanced DNS Settings

  • 4.Implementing IPAM

  • Implementing Advanced File Services

  • 1.Configuring iSCSI Storage

  • 2.Configuring BranchCache

  • 3.Optimizing Storage Usage

  • Implementing Dynamic Access Control

  • 1.Overview of Dynamic Access Control

  • 2.Planning for Dynamic Access Control

  • 3.Deploying Dynamic Access Control

  • Implementing Distributed Active Directory Domain Services Deployments

  • 1.Overview of Distributed AD DS Deployments

  • 2.Deploying a Distributed AD DS Environment

  • 3.Configuring AD DS Trusts

  • Implementing Active Directory Domain Services Sites and Replication

  • 1.Overview of AD DS Replication

  • 2.Configuring AD DS Sites

  • 3.Configuring and Monitoring AD DS Replication

  • Implementing Active Directory Certificate Services

  • 1.PKI Overview

  • 2.Deploying CAs

  • 3.Deploying and Configuring CA Hierarchy

  • 4.Deploying and Managing Certificate Templates

  • 5.Implementing Certificate Distribution and Revocation

  • 6.Managing Certificate Recovery

  • Implementing Active Directory Rights Management Services

  • 1.AD RMS Overview

  • 2.Deploying and Managing an AD RMS Infrastructure

  • 3.Configuring AD RMS Content Protection

  • 4.Configuring External Access to AD RMS

  • Implementing Active Directory Federation Services

  • 1.Overview of AD FS

  • 2.Deploying AD FS

  • 3.Implementing AD FS for a Single Organization

  • 4.Deploying AD FS in a B2B Federation Scenario

  • Implementing Network Load Balancing

  • 1.Overview of NLB

  • 2.Configuring an NLB Cluster

  • 3.Planning an NLB Implementation

  • Implementing Failover Clustering

  • 1.Overview of Failover Clustering

  • 2.Implementing a Failover Cluster

  • 3.Configuring Highly Available Applications and Services on a Failover Cluster

  • 4.Maintaining a Failover Cluster

  • 5.Implementing a Multi-Site Failover Cluster

  • Implementing Failover Clustering with Hyper-V

  • 1.Overview of Integrating Hyper-V with Failover Clustering

  • 2.Implementing Hyper-V Virtual Machines on Failover Clusters

  • 3.Implementing Hyper-V Virtual Machine Movement

  • 4.Managing Hyper-V Virtual Environments by Using VMM

  • Implementing Disaster Recovery

  • 1.Overview of Disaster Recovery

  • 2.Implementing Windows Server Backup

  • 3.Implementing Server and Data Recovery

AWS TrainerMCSA Trainer

A dynamic and self - motivated Trainer and System Administrator. Aspiring for a Bright and challenging career in the field of Training and Networking Technology, which could enable me to upgrade myself with emerging trends and technologies to benefits of the professional growth and accomplishment of organizational goals.

Student Review