Rs 1,400
You can also call the Study Centre
91994... More

Important information

Typology Certificate
Methodology Online
Class hours 18h
Start Different dates available
  • Certificate
  • Online
  • 18h
  • Start:
    Different dates available

Suitable for: All


Where and when

Starts Location
Different dates available
Starts Different dates available

Course programme

MCTS: Windows 7 Configuration Exam
Windows 7 Installation
Preparing to Install Windows 7
Editions of Windows 7
Minimun Hardware Requirements for Installing Windows 7
Options for Installing Windows 7
Methods for Performing Clean Installation
Discussion: Common Installation Errors
Demo - Configuring the Computer Name and Domain/Workgroup Settings
Upgrading and Migrating to Windows 7
Considerations for Upgrading and Migrating to Windows 7
Identifying the Valid Upgrade Paths
Process for Upgrading to Windows 7
Tools for Migrating User Data and Settings
Process for Migrating to Windows 7
Migrating User Settings and Data by Using WET
Performing Image-based Installation of Windows 7
What is Windows Imaging File Format?
Tools for Performing Image-based Installation
Image-based Installation Process
Migrating User Settings and Data by Using USMT 4.0
Configuring Application Compatibility
Common Application Compatibility Problems
Common Mitigation Methods
Managing Disks and Device Drivers
Partitioning Disks in Windows 7
What is an MBR Disk?
What is a GPT Disk?
Disk Management Tools
Demo - Converting an MBR Partition to a GPT Partition
Managing Disk Volumes
What is a Simple Volume?
Demo: Creating a Simple Volume
What are Spanned and Striped Volumes?
Demo - Creating Spanned Volumes
Demo - Creating Striped Volumes
Purpose of Resizing a Volume
Demo - Resizing a Volume
Maintaining Disks in Windows 7
What is Disk Fragmentation?
Defragment a Disk
What are Disk Quotas?
Demo - Configuring Disk Quotas
Managing Signed Drivers
Discussion: Options for Recovering from a Driver Problem
Demo - Managing Drivers by Using Device Manager
File Sharing and Printers Configuration
Authentication and Authorization Process
What are NTFS Permission?
What is Permission Inheritance?
Demo - Configuring NTFS Permissions for Files and Folders
Impact of Copying and Moving Files and Folders on set Permissions
What are Effective Permissions?
Discussion: Determining Effective Permissions
Managing Shared Folders
What are Shared Folders?
Methods of Sharing Folders
Discussion: Combining NTFS and Share Permissions
The Network and Sharing Center
Configuring File Compression
What is NTFS File Compression?
Discussion: Impact of Moving and Copying Compression Files and Folders
What are Compressed (zipped) Folders?
Demo - Compressing Files and Folders
Managing Printing
Printing Components in Windows 7
Demo - Installing and Sharing a Printer
Managing Client-Side Printing
Configuring Location-aware Printing
Desktop Security
Overview of Security Management in Windows 7
Key Security Features in Windows 7
What is Action Center?
Demo - Configuring Action Center Settings
Securing a Windows 7 Client Computer by Using Local Security Policy Settings
What is Group Policy?
How are Group Policy Objects Applied?
How Multiple Local Group Policies Work
Demo - Creating Multiple Local Group Policies
Demo - Configuring Local Security Policy Settings
Securing Data by Usng EFS and BitLocker
What is EFS?
Demo - Encrypting and Decrypting Files and Folders by Using EFS
Group Policy Settings for BitLocker
What is AppLocker?
Demo - Configuring AppLocker
What are Software Restriction Policies?
Configuring User Account Control
Demo - Configuring Group Policy
Configuring Windows Firewall
Discussion: What is a Firewall?
Configuring the Basic Firewall Settings
Windows Firewall with Advanced Security Settings
Well-Known Ports Used by Applications
Demo - Configuring Inbound, Outbound, and Connection Security Rules
Configuring Windows Defender
What is Malicious Software?
What is Windows Defender?
Scanning Options in Windows Defender
Demo - Configuring Windows Defender Settings
Managing Windows 7 Client Performance
Maintaining Performance by Using the Windows 7 Performance Tools
Discussion: What Are Performance and Reliability Problems?
Performance Information and Tools
Performance Monitor and Data Collector Sets
Demo - Using the Resource Monitor
!!! Wisdom to Thrive!!!
Mob: 9940549779
Demo - Analyzing System Performance by Using Data Collector Sets and Performance Monitor
Considerations for Monitoring System Performance in Windows 7
Maintaining Reliability by Using the Windows 7 Diagnostic Tools
Problems That Windows Diagnostic Tools Can Help Solve
The Windows Memory Diagnostics Tool
Windows Network Diagnostics Tools
Reliability Monitor and Problems Reports and Solutions Tool
Windows Startup and Recovery
Backing Up and Restoring Data by Using Windows Backup
Discussion: Need for Backing Up Data
Backup and Restore Tool
Demo - Perform a Backup
Restoring a Windows 7 System by Using System Restore Points
How System Restore works
What are Previous Versions of Files?
Configuring System Protection Settings
Demo - Restore a System
Configuring Windows Update
What is Windows Update?
Configuring Windows Update Settings
Windows Update Group Policy Settings
Mobile Computing with Windows 7
Power Plans and Power-Saving Options in Windows 7
Demo - How to Configure a Power Plan
Configuring Remote Desktop and Remote Assistance for Remote Access
What are Remote Desktop and Remote Assistance?
Configuring Remote Desktop
Configuring DirectAccess for Remote Access
What is a VPN?
Configuring Windows Server 2008 Active
Directory (70-640)
Installing AD DS

Active Directory, Identity, and Access
Components of an AD Infrastructure
Preparing to Create a New Windows Server 2008 Forest
Adding the AD DS Role Using the Windows Interface
Demo - Creating a Windows Server 2008 Forest
AD DS on Server Core
Understanding Server Core
Installing Server Core
Demo - Installing a Server Core Domain Controller
Working with AD Snap-ins
Understanding the MMC
AD Administrative Tools
More of the MMC
Custom MMC
Demo - Custom MMC
Lesson 2: Creating Objects in AD
Creating an OU
Creating a User Object
Creating a Group Object
Finding Objects in Active Directory
Demo - Using Active Directory
Understanding Delegation
Demo - Delegation
Automating the Creation of User Accounts
Using Active Directory Command-Line Tools
Demo- Automating User Accounts
Creating Users with Windows PowerShell and VB Script
Supporting user Objects and Accounts
Managing User Attributes
Understanding Name and Account Attributes
Account Properties
Managing User Attributes
Administering User Accounts
Demo - Supporting User Accounts
Creating and Managing Groups
Managing and Enterprise with Groups
Defining Group Naming Conventions
Understanding Groups
Managing Group Membership
Demo - Managing Groups
Automating the Creation and Management of Groups
Creating and Managing Groups
Managing Group Membership with Windows PowerShell and VBScript
Demo - Automating Creation of Groups
Administering Groups in an Enterprise
Best Practices for Group Attributes
Protecting Groups from Accidental Deletion
Delegating the Management of Group Membership
Demo - Administering Groups
Creating Computers and Joining the Domain
Understanding Workgroups, Domains, and Trusts
Identifying Requirements for Joining a Computer to the Domain
Creating OU's for Computers
Demo - Joining the Domain
Automating the Creation of Computer Objects
Importing Computers with CSVDE
Importing Computers with LDIFDE
Creating Computers with DSadd
Creating Computers with VBScript
Demo - Automating Computer Creation
Supporting Computer Objects and Accounts
Configuring Computer Properties
Moving a Computer
Managing a Computer with the AD Users and Computers
Recognizing a Computer Account Problem
Resetting a Computer Account
Renaming a Computer
Disabling and Enabling Computer Accounts
Deleting a Computer Account
Recycling Computers
Implementing Group Policy
!!! Wisdom to Thrive!!!
Mob: 9940549779
Review of Group Policy
Policy Settings
Filtering Administrative Template Policy Settings
Demo - Group Policy
Managing Group Policy Scope
GPO Links
Inheritance and Precedence
Security Filtering to Modify GPO Scope
WMI Filters
Enabling or Disabling GPO's and GPO Nodes
Demo - Group Policy Scope
Supporting Group Policy
Resultant Set of Policy
Demo - Verifying Group Policy
Delegating the Support of Computers
Understanding Restricted Groups Policies
Demo - Restricted Groups
Managing Security Settings
Configuring the Local Security Policy
Using the Security Template Snap-in
Deploying Security Templates by Using GPO's
Analyzing the Security Configuration of a Computer
Managing Software with GP Software Installation
Understanding GP Software Installation
Windows Installer Programs
Creating a Software Deployment GPO
Managing the Scope of Software Deployment GPO
Demo - Software Deployment
Demo - Auditing
Configuring Password and Lockout Policies
Understanding Password Policies
Understanding Password Settings Object
Demo - Passwords
Auditing Authentication
Account Logon and Logon Events
!!! Wisdom to Thrive!!!
Mob: 9940549779
Configuring Authentication-Related Audit Polices
Demo - Account Logging
Configuring Read-Only Domain Controllers
Deploying an RODC
Password Replication Policy
Understanding and Installing DNS
DNS and IPv6
Peer Name Resolution Protocol
Types of DNS Servers
Understanding DNS
DNS Terms
Types of Records
Windows Server DNS Features
Demo - DNS
Configuring DNS
Demo - Global Names
Installing Domain Controllers
Installing a DC with the Windows Interface
Unattended Installation Options and Answer Files
Installation Options
Configuring Operations Masters
Transferring Operations Master Roles
Seizing Operations Masters
Demo - FSMO
Configuring Sites and Subnets
Understanding Sites
Site Traffic
Planning Sites
Defining Sites
Demo - Sites and Subnets
Reviewing AD Partitions
Configuring a GC
Understanding AD Replication
!!! Wisdom to Thrive!!!
Mob: 9940549779
Intersite Replication
Monitoring Replication
Understanding Domain and Forest Functional Levels
Functional Levels
Domain Functional Levels
Forest Functional Levels
Defining the Forest Infrastructure
Trust Relationships
Securing Trust Relationships
Demo - Trusts
Proactive Directory Maintenance and Data Store Protection
Important Concepts
Twelve Categories of AD DS Administration
Performing Online/Offline Maintenance
Managing System Resources
Demo - Performance Monitor
Understanding and Installing AD LDS
What is AD LDS
AD LDS Scenarios
Installing AD LDS
Demo - Installing AD LDS
Working with AD LDS Tools
Creating an LDS Instance
Understanding and Installing AD CS
Understanding AD CS
CA Options
Creating the CS Hierarchy
Additional Planning Requirements
Installing AD CS
Demo - Certificate Services
Finalizing the Configuration of an Issuing CA
Understanding and Installing AD RMS

Understanding AD RMS
New AD RMS Features
Basic Concepts
AD RMS Installation Scenarios
Preparing AD RMS Installation Prerequisites
AD RMS Considerations
Understanding AD RMS Certificates
Configuring AD RMS
Managing Databases
Understanding AD FS
Understanding AD FS
The AD FS Process
AD FS Components
Lesson 2: Configuring and Using AD FS
Finalizing the Configuration of AD FS
Using and Managing AD FS
Configuring Windows Server 2008
Network Infrastructure (70-642)
Understanding and Configuring Network Connections
What are Network Layers
OSI Model
OSI vs TCP/IP Model
Configuring Networking Properties for Vista and 2008 Server
Demo - Configuring IP
Demo - Testing Connectivity
Understanding IP Version 4
Ipv4 Address Structure
The Subnet Mask
What is Subnetting
Demo - IP Addressing
Understanding IP Version 6
Introducing IPv6

IPv6 Transition Technologies
Understanding Name Resolution in Windows Server 2008 Networks
Name Resolution Methods in Windows
WINS Server Name Resolution
How a DNS Query Works
Demo - Name Resolution
Deploying a DNS Server
Configuring Server Properties
Demo - Configuring DNS
Configuring DNS Client Settings
Specifying DNS Servers
Suffix Search List
Configuring Dynamic Update Settings
Clearing the Client Cache
Demo - DNS Client
Creating and Configuring Zones
Creating Zones
Creating a Forward or Reverse Lookup Zone
Dynamic Updates
Examining Built-in Resource Records
Enabling DNS to use WINS Resolution
Aging and Scavenging
Configuring Zone Replication and Transfers
Configure a Zone Replication Scope for Active Directory
Choosing Zone Replication Scope
Creating Custom Application Directory Partitions
Zone Transfers
Implementing Stub Zones
Demo - Secondary Zone
Installing a DHCP Server
Understanding DHCP Address Assignment
Address Leases
DHCP Scopes
Adding the DHCP Server Role
DHCPv6 Stateless Mode
Demo - DHCP
Demo - DHCP Options
Configuring a DHCP Server
Post-Installation Tasks
Other DHCP Options
DHCP on the Server Core
Routing Overview
Routing Process
Examining Network Routes
Routing Protocols
Routing and Remote Access
Demo - IP Routing
Demo - Routing Protocols
Configuring IPSec
What is IPSec?
IPSec Policies
Connection Security Rules
Security Associations
How IPSec Connections are Established.
Authentication Methods for IPSec
Predefined IPSec Policy
IP Security Rule Wizard
Connection Security Rule Wizard
Demo - IPSec
Configuring Network Address Translation
NAT Concepts
Windows 2008 NAT Options
Configuring ICS
Configuring NAT using RRAS
Troubleshooting NAT
Best Practices
Connecting to Remote Networks
Remote Access Overview
Configuring Dial-Up Server

Configuring VPN Connections
Configuring the VPN Server
Testing Connectivity
Demo - VPN Connections
Configuring Windows Firewall
Why are Firewalls Important
Inbound Filtering
Outbound Filtering
Firewall Scope
Authorizing Connections
Group Policies
Demo - Windows Firewall Inbound
Demo - Windows Firewall Outbound
Configuring Network Access Protection
Concepts of NAP
System Health Agents and Validators
The NAP Process
Planning NAP Deployment
Installing and Configuring NAP
Other Configurations
IPSec Rules
Configuring DHCP
Configuring NAP Components
Configuring Network Policies
Demo - Install NAP
Demo - NPS
Understanding Windows Server Update Services
WSUS Overview
WSUS Architecture
WSUS Requirements
Planning for the WSUS Installation
Auditing Updates
Demo - Install WSUS
Using Windows Server Update Services
How to Troubleshoot Update Problems

How to Remove Updates
Managing File Security
NTFS Files Permissions
NTFS Permissions
Methods of Securing Files
How to Encrypt a File/Folder
Sharing Encrypted Files
Configuring EFS Using GPS
Demo - File Security
Demo - EFS
Sharing Folders
The File Services Server Role
Using Quotas
Configuring Quotas
Sharing Folders (Cont.)
DFS Overview
Installing DFS
Demo - DFS
Backing Up and Restoring Files
Shadow Copies
Managing Shadow Copies
Windows Server Backup
Demo - Back Up
Managing Printers
Installing the Print Services Server Role
Installing Printers
Sharing Printers
Printer Pooling
Printer Priority
Managing Internet Printing
Generating Notifications
Migrating Printers
Managing Printers with the CLI
Demo - Managing Printers
!!! Wisdom to Thrive!!!
Mob: 9940549779
Demo - Web Printing
Configuring Windows Server 2008
Applications Infrastructure (70-643)
IIS 7 Web Server Installation and Configuration
IIS 7 Web Server Installation and Configuration
Introduction to IIS 7.0
Installation Methods
Installing in a Virtualized Environment
Demo - Installing IIS
IIS Configuration
Configuration Files
Application Development Features
Configuration Health and Diagnostic Features
Configuring HTTP Features
Configuring Performance Features
Configuring Security Features Configuring SMTP Features
Demo - IIS Create Website
WebSites and Application Pools Configuration
WebSites and Application Pools Configuration
How Are Web Sites and Application Pools Used?
Review of the Unified Request Processing Pipeline in 7.0
How Does Authentication Work in IIS 7.0?
Review of Authentication Types
What Are the Default Application Pool Properties?
Creating a Web Site
Creating a Web Application
Creating a Virtual Directory
Demo - Authenticating and Creating Virtual Directories
Managing Authentication
ASP.NET Application Settings
ASP.NET Application Settings
Review of the ASP.NET Platform
Installing the ASP.NET Role Service
Configuring Error Messages
Demo - Custom Errors
When to Use Stage and Deploy
Demo - Configuring ASP.Net
Configuring File and Folder Security
Configuring Advanced Security to Reduce Attack Area
Adding ISAPI Filters
Configuring .NET Trust Levels
Demo - Configure Application Settings
Remote Server and Web Sites Administration
Remote Administration Overview and Service Settings
Configuring Remote Administration for IIS Server
Demo - Configure Remote Admin
Distributed Configuration System Overview
How to Delegate Administrative Rights
Demo - Delegated Administration
Feature Delegation in IIS 7.0
Feature Delegation Options
Default Feature Delegation Settings
Demo - Delegation and Remote Administration
Feature Delegation With Remote Management
Best Practices for Feature Delegation
Maintain Web Servers using Command-line and Scripting
Maintain Web Servers using Command-line and Scripting
IIS 7.0 Management
Demo - IIS and PowerShell
Using Scripts for Administrative Tasks
Advanced Settings
Manage IIS Web Server Performance
Manage IIS Web Server Performance
Impact of Global Changes on Worker Process
Why Consolidate Server Roles?
Configure Web Site Limitations
Configuring Cache Settings
Demo - Configuring IIS Performance
Guidelines for Configuring Compression
How to Install and Configure WSRM
Demo - Tuning IIS
Configuring Logging Frequency
Managing Application Pools
Demo - Applying Applications
Website Availability and Load Balancing
Website Availability and Load Balancing
Performing Web Server Backup Validation
Pros and Cons Offline Configuration Files vs. DFS
Reviewing the Benefits of Using Shared Configurations
Enabling Shared Configuration with the IIS Manager
Enabling Shared Configuration from the Command Line
Impact if Shared Configuration is Offline
Shared Configurations Best Practices
Configuring NLB Using Shared Configurations
Reviewing NLB IIS Server Farms Best Practices
Web Server Troubleshooting
Web Server Troubleshooting
When to Monitor for Critical Errors
Creating a Failed Request Tracing Rule to Monitor Critical Errors
Configuring Selective Logging for an Application
Best Practices for Logging
Enabling Trace Logging
Demo - Troubleshooting
Demo - Troubleshooting Authentication
Demo - Troubleshooting Authorization
Module 10 Review
Installing and Configuring TS Core Functionality
Installing and Configuring TS Core Functionality
TS Features
Installing the TS Server Role Service
!!! Wisdom to Thrive!!!
Mob: 9940549779
Demo - Install and Configuring TS
Authentication Modes
Configuring Other TS Settings
Configuring Performance Features
TS Licensing Configuration
TS Licensing Configuration
TS Licensing Role
TS Licensing Manager Snap-In
TS Client Access Licenses
Installing the TS Licensing Role Service
Configuring the Terminal Server for Licensing
Managing TS Client Access Licenses
Troubleshooting Licenses
TS RemoteApp and EasyPrint
TS RemoteApp and EasyPrint
Types of Applications
Considerations for Installing Applications
Demo - Configuring RemoteApp and EasyPrint
Introduction to TS RemoteApp Programs
Advantages of Using RemoteApp Programs
Demo - Configure RemoteApp
TS Web Access and Session Broker
TS Web Access and Session Broker
Introduction to TS Web Access
TS Web Access
Considerations for Installing TS Web Access
Demo - Configure TS Web Access
Deploying the TS Web Access Web Part
Connecting to Remote Desktop Web by Using TS Web Access
Introduction to TS Session Broker
Prerequisites for Configuring TS Session Broker
TS Gateway Troubleshooting
TS Gateway Troubleshooting
Requirements for TS Gateway
Demo - Configure and Troubleshoot TS Gateway
Obtaining Certificates
Monitoring Active Connections Through TS Gateway
Troubleshooting TS Gateway
Demo - TS Gateway
Managing and Monitoring TS Connections
Managing and Monitoring TS Connections
Monitoring the TS Connections
Introduction to WSRM
Features of WSRM
Configuring Windows System Resource Manager
Demo - Manage and Monitor TS
Demo - Introduction to PowerShell