€¦ · 2 table of contents introduction

205
New Horizons Computer Learning Center of Reading 3 Park Plaza, Suite #103, Park Road Wyomissing, PA 19610 Phone: 610-685-2613 Fax: 610-685-2615 Email: [email protected] WEB: www.nhreading.com Date of Publication: December 1 st 2013

Upload: others

Post on 26-Aug-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: €¦ · 2 Table of Contents Introduction

New Horizons Computer Learning Center of Reading 3 Park Plaza, Suite #103, Park Road

Wyomissing, PA 19610

Phone: 610-685-2613 Fax: 610-685-2615 Email: [email protected]

WEB: www.nhreading.com Date of Publication: December 1st 2013

Page 2: €¦ · 2 Table of Contents Introduction

2

Table of Contents

Introduction ........................................................................................................................................................... 3 Management .......................................................................................................................................................... 3 Facilities .................................................................................................................................................................. 3 Inclement Weather................................................................................................................................................. 3

About New Horizons .............................................................................................................................................. 4 History .................................................................................................................................................................... 4 Partnerships and Vendor Authorization ................................................................................................................. 4 Institutional Purpose and Objective ....................................................................................................................... 5

The New Horizons Team ........................................................................................................................................ 6 Instructors .............................................................................................................................................................. 6 Educational Consultants ......................................................................................................................................... 6 Student Services ..................................................................................................................................................... 6 Career Services ....................................................................................................................................................... 6

Student expectations to stay enrolled in program .......................................................................................... 7 8 Step Job Placement Assistance Program ...................................................................................................... 8

New Horizons Customer Commitment ................................................................................................................... 9 Our Mission ............................................................................................................................................................ 9 Our Vision ............................................................................................................................................................... 9 Our Values .............................................................................................................................................................. 9 Center Operations .................................................................................................................................................. 9

Admission Requirements & Procedures ............................................................................................................... 10 Registration .......................................................................................................................................................... 10 Requirements ....................................................................................................................................................... 10 Attendance ........................................................................................................................................................... 10 Rescheduling ........................................................................................................................................................ 11 Tardiness .............................................................................................................................................................. 11 Make-Up ............................................................................................................................................................... 11

Student Conduct .................................................................................................................................................. 12 Student Progress and Program Completion ......................................................................................................... 13 School Policies ..................................................................................................................................................... 14

Description of Grading System ............................................................................................................................. 14 Cancellation and Refund Policy ............................................................................................................................ 14 Retake Policy ........................................................................................................................................................ 15 Grievance Policy ................................................................................................................................................... 15 Non-Discrimination Policy .................................................................................................................................... 16 Americans with Disability Act Accessibility .......................................................................................................... 16 Education Credit and Student Aid Policy .............................................................................................................. 16

Student Information ............................................................................................................................................ 17 Certification Exams ............................................................................................................................................... 17 Courseware........................................................................................................................................................... 17 Student Perks ....................................................................................................................................................... 17

Information Technology and Healthcare Information Programs .......................................................................... 18 MIS Network Administrator ................................................................................................................................. 19 Computer and Network Support Technician ...................................................................................................... 109

Copies of the Full-version General Student Information Publication are available to view at the Front Desk.

Page 3: €¦ · 2 Table of Contents Introduction

3

Introduction

Management

Stacy Shannon, School Director / General Manager

Frank Serino, Acting School Director

Shawn Mera, Consumer Education Manager

Sarah Haydt, Director of Student Services / Acting School Director

Facilities

New Horizons Computer Learning Center of Reading provides training at our new, clean, modern, state-of-the-art

facility at 3 Park Plaza, Suite 103 Wyomissing, Pa. We have easy-on/easy-off access to PA Route 12 and Route

422. Our facility has 2 classrooms with seating capacity of 8 to 16 seats per room. New Horizons Computer

Learning Center of Reading equips every student with a personal workstation consisting of a comfortable office

chair, PC with a 17” Monitor, and large desk. Authorized exercises according to the respective programs are

downloaded into each computer from the internal network, and internet based exercises use T1 Internet access for

classroom exercises. The courseware for each class is in printed form based upon the curriculum. The instructor uses

a variety of teaching tools to enhance the learning experience.

Inclement Weather

During winter storms New Horizons may delay or cancel courses for the day and evening classes. The students may

find that decision by calling (570) 602-2700 x 150, by internet at www.wfmz.com or by watching Channel 69 on

your local stations. Remember it is always at your own discretion to travel during inclement weather.

Page 4: €¦ · 2 Table of Contents Introduction

4

About New Horizons

New Horizons Computer Learning Centers Inc., founded in 1982, is a subsidiary of New Horizons Worldwide, Inc.

(NASDAQ: NEWH). Headquartered in Conshohocken, Pennsylvania, New Horizons is the world’s largest

independent IT training company, serving the needs of over 3 million students each year. New Horizons offers top

quality, customer focused training choices in multiple delivery methods and formats that can be tailored to meet

individual learning styles and specific needs. As we celebrate our 30th

anniversary, we are proud to say we have

more than 300 centers in over 70 countries; New Horizons delivers training to more people than any other training

company.

New Horizons delivers the greatest range and depth of content-centered learning solutions with a unique integrated

learning approach, which encompasses more than just “taking a class”. It’s a complete method of training,

reinforcing, supporting, and validating. New Horizons combination of courseware, labs, simulations, and reference

solutions deliver industry-leading learning solutions. Our state-of-the-art equipment and real-world solutions, taught

by industry experts ensure highly-deployable, reliable and multi-leveled learning. As the foundation of our

Integrated Learning methodology, the classroom experience has become a more enriching, dynamic, and valuable

learning method for students. Students have their own networked environments, which enable instructors to manage

hands-on lab demonstrations and exercises that mirror the professional environment. Learning Port access enables

information to be delivered in a customized, student-centric format, via the Internet, and features our world-

renowned, from anytime, anywhere. Learning Port access provides easy access to educational materials and

increases collaboration.

New Horizons Career Development Learning Solutions provides a cost-effective and compelling education solution

for individuals wanting to enhance their careers or start a new career. With an industry-focused approach, programs

encompass multiple industry certifications from a variety of leading vendors, along with hands-on practice and

interactive education experiences. Specific job skills training, combined with problem solving, critical thinking, and

other relevant business skills training, enhances the graduate’s long-term career development.

History

In 2000, New Horizons Computer Learning Center of Wilkes-Barre/Scranton began providing computer training

services to Wilkes-Barre/Scranton and all of Northeast Pennsylvania area businesses, governments, educational

institutions, and individuals. Since then, we have grown as part of an organization that is currently the largest

independent IT training organization in the world. The staff from the Wilkes-Barre/Scranton learning center have

been awarded; “New Horizons Center of the Year,” # 3 worldwide for “Training Excellence” in the New Horizons

Network and #1 for “Training Excellence” in North America. In 2010 New Horizons Computer Learning Centers,

added the prestigious KnowledgeAdvisors, “Best Performance Award,” to its ever-expanding trophy case. In 2011,

New Horizons was awarded the coveted “5 STAR CENTER OF EXCELLENCE” award and the “Cisco Partner Of

The Year Award.”

Partnerships and Vendor Authorization

Certification plays a role in keeping organizations competitive. They are one of the best ways to ensure that

employees have the necessary knowledge, skills, and experience. In addition to being the world’s largest

independent training provider, New Horizons holds the designation of being the largest network provider for many

of our technical and certification vendor partner programs, including:

Information Technology

Microsoft

CompTIA

Page 5: €¦ · 2 Table of Contents Introduction

5

Cisco

Healthcare Information

American Medical Certification Association (AMCA)

American Academy of Professional Coders (AAPC)

Institutional Purpose and Objective

New Horizons Computer Learning Center of Wilkes-Barre/Scranton provides customer-focused training choices and

vendor authorized programs. Businesses and individuals receive top-quality training tailored to meet their specific

needs how and when they want to learn. As a result, students have the freedom to personalize training programs to

best suit their individual schedules and needs with a variety of vendor authorized training choices. New Horizons

Computer Learning Center of Wilkes-Barre/Scranton is in the business of helping people and businesses attain their

personal training goals. By providing the skills that develop a more productive workforce, New Horizons Computer

Learning Center of Wilkes-Barre/Scranton is helping individuals keep pace with the rapid and complex changes

taking place in the economy.

Page 6: €¦ · 2 Table of Contents Introduction

6

The New Horizons Team

New Horizons Computer Learning Center offers an incredible resource of some of the best and brightest medical,

business, and computer technology–minded people in the area.

Instructors

Our instructors are not only professional educators but also outstanding presenters. They know how

to mix patience, humor, and enthusiasm to achieve maximum comprehension. Our instructors adjust

their pace and instruction to meet their students’ needs. They also bring their own real-world

experience into the classroom, creating a rich learning environment. Our instructors complete

professional development on a regular basis and continuously gain more certifications.

Educational Consultants

Our Educational Consultants are another excellent resource for our students. From the first time you

contact New Horizons, our Educational Consultants are trained to help you decide on the best

possible training path for you, working with you to understand your life goals and educational needs.

They aid with information on class prerequisites and course descriptions, in addition to providing a

plethora of resource information to achieve your training goals.

Student Services

Students that attend New Horizons will be assigned a Student Services Representative that will guide the student

throughout the program, develop a course schedule, discuss any changes in their curriculum, and aid in overcoming

obstacles that may prevent them from successfully completing their chosen program/course and achieving their

career goals in the Information Technology or Healthcare field. He or she will be your single point of contact to help

guide you to achieve your goals.

Career Services

New Horizons Computer Learning Centers of Wilkes-Barre/Scranton offers job placement assistance through the

Career Services Department for students who are enrolled in a diploma program or taking three or more courses.

We currently have a working relationship with staffing companies and our business clients through our “Hire Our

Graduates” program in order to provide career services and placement assistance. Informal networking opportunities

are readily available as classes contain professionals from prominent companies of Wilkes-Barre/Scranton and

surrounding areas. Our Career Services Department will keep a copy of the student’s resume on file so they may

refer their resume to local companies that are currently seeking prospective candidates for employment. New

Horizons Computer Learning Centers of Wilkes-Barre/Scranton does not guarantee employment.

If you choose to enroll in the Job Placement Assistance program you will be given a toolbox of information that

contains all the pertinent information you need to be successful in your job searching. This is an imperative step in

this program. You must enroll in this program to be accepted into the Job Placement Assistant Program.

Page 7: €¦ · 2 Table of Contents Introduction

7

Although, we provide you with the tools necessary for your job searching, you will play a huge role in your success.

You will have to be proactive in your search, staying in contact with Career Services Department and keeping your

resume updated.

Student expectations to stay enrolled in program

You must graduate from New Horizons in order to receive placement help

You may not be accepted into the program if you are on attendance probation, any violations of

school policies or excessive tardiness

There must be once a month contact with Career Services Department to stay enrolled

The Career Services Department must have your resume within 20 days of graduation; if they

do not have your resume they can not provide you with help as they do not know what you are

qualified for

Enrollment into the program lasts for 12 months from graduation

Students will be helped until they have found full time work in their field of study

We will help students over the one year time frame on a case by case basis- determining factors

include but are not limited to: how long ago you graduated, the effort you put in, your

communication log with the Career Services Department

Page 8: €¦ · 2 Table of Contents Introduction

8

8 Step Job Placement Assistance Program

Steps Description Stage

Career Assessment Students discuss both long term and short term career

goals. Start of Training

Career Meetings Periodic meetings with Director of Student Services to

discuss classes’ progression and certifications goals. Whole Program

Workshop 1

Resumes and Cover Letters: Students will learn

about all the tools they need to get out in the job

market. How to build a cover letter and a professional

resume.

75% of program

completed

Update Resume Career Services will review your resume and provide

feedback for your review.

75% though

graduation

Workshop 2

Professional Development: Students will learn

Interviewing Skills, Negotiating Skills and Time

Management. Including: how to prepare before

interviewing, during the interview and after the

interview. Professional Dress, frequently asked

interview questions, thank-you letters, follow-up

inquiries, offer letters, social networking, and job

searching.

75% of program

completed

Job Leads The Career Services Department will send you job

leads based upon your program.

75% of program

completed

Company Contacts Send final resume to staffing companies and corporate

companies for potential employment. Graduation

Mock Interviews

Students will participate in a simulated interview once

requested in writing. Feedback will be provided to

you .

Graduation

Page 9: €¦ · 2 Table of Contents Introduction

9

New Horizons Customer Commitment Our Mission

We Empower People Around the World to Succeed through Learning. By providing exceptional training

backed by superior customer service, New Horizons Computer Learning Center offers training solutions to

customers worldwide that significantly improve their businesses and careers.

Our Vision

To be the leaders in innovative training solutions and provide our customers with impeccable service and support.

Our Values Act with integrity, ethics and honesty

Treat everyone with respect

Succeed through teamwork

Take Initiative and expect accountability

Exceed customer expectations

Perform with passion and commitment to surpass goals

Celebrate success and recognize outstanding achievement

Center Operations

New Horizons Computer Learning Center of Wilkes-Barre/Scranton offers day and evening classroom training.

Weekday classes begin at 9:00 a.m. and conclude by 5:00 p.m. Evening classes begin at 5:30 p.m. and conclude at

9:30 p.m.

New Horizons Computer Learning Center of Wilkes-Barre/Scranton facilities are closed each year in observance of

the following national holidays:

New Years Day Thanksgiving Day and Day After

Memorial Day Christmas Eve

Independence Day Christmas Day

Labor Day New Years Eve

New Horizons of Wilkes-Barre/Scranton will also be closed due to Winter Break the week between Christmas and

New Years and the week following. New Horizons may also be closed for Summer Break, 1-2 weeks during the

summer months of June and July; this is at New Horizons discretion.

Page 10: €¦ · 2 Table of Contents Introduction

10

Admission Requirements & Procedures

Registration Registration for the Training Programs must be conducted in person at the center. Upon

contacting the Center, students will be directed to the Educational Consultant assigned to

Certification Preparation Training Programs. It is the primary function of the Educational

Consultant to assist students with program guidance and enrollment. A Student Services

Representative will then develop a course schedule based upon the students needs and provide

guidance throughout the program.

Requirements Programs listed in the catalog require that a student must be a High School graduate or have

obtained their GED. Also, each program has specific requirements that are listed on the “Course

Summary” page located before each program. These requirements must be satisfied before any

enrollment can begin.

Attendance

One of the reasons for New Horizons success is that a business environment is simulated. Just as one would not be regularly late or absent on the job, full attendance is expected in all courses. However, also as recognized by businesses, we understand that some circumstances may prevent a student from attending every day. The attendance policy is structured to mirror the real business world. That is, New Horizons, like employers, expects that students will make up all missed work.

The deadline to hand in missed work is three weeks after the absences. Any student missing more than 10% of a course or scheduled program hours will be placed on

attendance probation. Students are required to attend 80% of the scheduled course hours (including periods

for review sessions or course retakes). Any student missing more than 20% is required to repeat the entire course before

moving on to the next course and will be charged for the tuition of the repeated course (See retake policy).

Additionally, a student missing three consecutive days will be subject to dismissal at the discretion of the school director.

When a student repeats the entire course they must begin the course from the beginning and are considered a retake for that course. The cancellation and no show policy of New Horizons Computer Learning Centers states I must cancel a class/session 48 hours before the scheduled class/session.

Page 11: €¦ · 2 Table of Contents Introduction

11

Rescheduling

New Horizons Computer Learning Center reserves the right to withdraw a course from the schedule due to insufficient enrollment. Should a course be withdrawn, any enrolled students may select another course from the schedule that will meet the requirements for the completion of their program. The withdrawn course will be added to the schedule on a future date and the enrolled students will be notified of that date and given the chance to be re-enrolled into that course at that time. New Horizons Computer Learning Center offers a variety of courses within each training program, so the student will not have any problem in completing their program in the time frame that was agreed upon in the Enrollment Agreement, provided the student does not deviate from the assigned schedule.

Tardiness

When a student is going to be tardy they must call New Horizons Computer Learning Center before 8:00 a.m. of the day that they are going to be tardy. Students arriving late to class may be required by the Instructor to wait to enter class until the next schedule break so as not to interrupt a lecture or lab in progress causing a disruption of the class. If you do not give prior notification of tardiness, and arrive after 9:30 a.m. your seat may be given to another student that was placed on standby for that class. When a student is tardy 3 days it will count as 1 day absent.

Make-Up

Students can make-up any work missed in one of three ways:

Students can make up any work missed on their own time- No Charge

Students can make up the time utilizing our lab facilities on their non-mentored learning day or non-regularly scheduled day- No Charge

Students may reschedule the session, with an instructor, as an additional day of class- $50/day make-up fee.

Page 12: €¦ · 2 Table of Contents Introduction

12

Student Conduct

While New Horizons Computer Learning Center is fully committed to preparing students for new careers, it cannot succeed without participation and commitment. The attitudes and behaviors exhibited during training and after beginning work are essential elements of program success. All students are required to consider the following when training in our business like environment; Attitude, Appearance and Hygiene, and speaking in a professional manner. Students are expected to use New Horizons Computer Learning Center property for its intended purpose only. In the classroom, students should exercise care in using the equipment and materials and refrain from entering with food items. As a courtesy to others, they should assist in maintaining the break-room by cleaning up after themselves. New Horizons Computer Learning Center encourages students to be considerate of and to abide by posted facility rules such as smoking only in designated areas. New Horizons Computer Learning Center maintains a facility that is free of weapons, firearms, knives, drugs and alcohol. This is essential to maintaining a safe and efficient learning and work environment. Substance abuse and violence is incompatible with health, safety, efficiency and success at New Horizons Computer Learning Center. Any misuse or abuse of the equipment, any configuration or tampering with any computer files related to the company network is a violation of policy by trainees or employees and will result in their removal from the facility. A repeat offense will result in possible dismissal of the program at the director’s discretion. New Horizons Computer Learning Center is committed to providing a safe and healthy training and work environment by complying with relevant federal and state occupational health and safety laws. New Horizons Computer Learning Center uses the operations, procedures, technologies and programs necessary to maintain such an environment. However, accident prevention is everyone's responsibility and can be aided by following these rules:

Exercise care and good judgment in using facility equipment.

Adhere to all posted signs or warnings.

Immediately report any unsafe conditions, equipment or practices to New Horizons Computer Learning Center staff.

Page 13: €¦ · 2 Table of Contents Introduction

13

Student Progress and Program Completion

New Horizons Computer Learning Center provides students with course completion certificates to assist the students with the progress and attendance of their training. Quizzes are available throughout the training to determine retention of knowledge. Once a student graduates, students will receive either a certificate of completion or a diploma. See below for more details.

Course Completion Certificate: provided when a course is completed satisfactory

Program Diploma: provided when a student graduates from an approved Diploma program

Transcripts: one copy provided to the student, upon request in writing, after graduation. Additional copies can be obtained for a fee of:

o Pick-up at New Horizons- $20 o Fed-ex to your home- $35

Page 14: €¦ · 2 Table of Contents Introduction

14

School Policies

Description of Grading System Grading Scale: A =93 – 100 B =83 – 92 C =75 – 82 D =65 – 74 E =Below 65 I =Incomplete W =Withdrew The grade will be determined by a 100% scale using assessment quizzes (50%), lab participation (25%), and class participation (25%). Students must achieve a C average to graduate and receive a diploma. Students that fall beneath a C average will be placed on Academic Probation for the next two courses. Students must meet the minimum graduation requirements by the end of the probation period. Students that do not meet the C average by the end of a probation period will be required to retake the last two courses before continuing to the next course. In addition, students that fail any course with a grade of E will be required to retake that course before continuing to the next course. (See retake policy)

Cancellation and Refund Policy

A. If a student cancels before attending his or her first class, the refund shall equal the sum of all amounts paid on behalf of the student for the program, less a registration fee of $150.00. The registration fee is fully refundable if the student requests cancellation within 5 calendar days after signing the enrollment agreement, if no classes have been attended, hours completed or materials used. A request for cancellation which is not made in writing shall be confirmed in writing by the student within an additional period of 5 calendar days. The student may mail it to the following address:

New Horizons Computer Learning Center Attn: Shawn Mera 145 CenterPoint Blvd. CenterPoint Commerce Park Pittston, PA 18640

Please include the following: 1. Name, Address, Phone number, Cell number 2. Reason for Refund 3. Any payment information and /or Invoices

Page 15: €¦ · 2 Table of Contents Introduction

15

4. What program/course you are requesting the refund for 5. Location of School

B. If a student enrolls and withdraws or is discontinued after submission of the first

completed lesson, but prior to completion of the program, minimum refunds shall be calculated as follows:

% Program Completed % Total Tuition Refund 1% - 10% 90% 11% - 25% 75% 26% - 50% 50% 51% - 100% 0%

The percentage of the program completed shall be determined by comparing the number of completed hours taken at the school to the total number of hours in the program. If tuition is not paid in full at time of refund request, your amount paid and refund amount will be deducted from original total tuition cost. *Excludes cost of test preparation packages. Test prep packages are non-refundable.

Retake Policy Should a student wish to retake any course once within their program, a student may do so within these certain guidelines: If a student is currently retaking a course and misses 20% of that courses hours, they can be dismissed at the discretion of the school director. This applies whether the retake is due to a failure or excessive absences. Re-take is on a seat available basis Student must bring the courseware from the original course and will receive a courseware credit Students must contact their Student Services Representative to schedule the re-take Students will be charged our single course tuition price for the course.

Grievance Policy

New Horizons Computer Learning Center is committed to delivering a quality service. Should any student be dissatisfied with the services of New Horizons Computer Learning Center of, he/she should immediately follow the steps below:

1. Contact your Director of Student Services 2. If not available please see any of the management listed on page 4 3. If your concern is still not addressed you should then contact:

Shawn Mera, General Manager

Page 16: €¦ · 2 Table of Contents Introduction

16

145 CenterPoint Blvd. CenterPoint Commerce Park Pittston, PA 18640

Or call (570) 602-2700 ext 101.

4. If a complaint is not settled at the institutional level, the student may bring the matter

to the attention of the State Board of Private Licensed Schools, Pennsylvania Department of Education, 333 Market Street, 12th Floor Harrisburg, PA 17126-0333.

Non-Discrimination Policy

New Horizons Computer Learning Center is an equal opportunity employer and training institute and will in no way discriminate against, deny benefits to, or exclude from participation any person on the grounds of race, color, national origin, religion, age, sex, handicap, or political affiliation or belief.

Americans with Disability Act Accessibility

New Horizons Computer Learning Center is in compliance with the handicapped accessibility guidelines as outlined in the "Americans with Disabilities Act and Section 504 of the Rehabilitation Act of 1973," as amended.

Education Credit and Student Aid Policy

New Horizons Computer Learning Center is a special purpose institution. That purpose is to provide personal computer, technical, and healthcare training leading to professional skills development. Students should be aware that transfer of credit is always the responsibility of the receiving institution. Whether or not credits transfer is solely up to the receiving institution. Any student interested in transferring credit hours should check with the receiving institution directly to determine to what extent, if any, credit hours can be transferred. New Horizons Computer Learning Center does not currently offer training that in itself offers education credits and does not require such for entry into its programs. New Horizons Computer Learning Center does not provide scholarship or financial aid assistance to students. However, New Horizons Computer Learning has relationships with several financial institutions, government agencies, and veteran agencies, which, we will offer a referral to students who wish to explore other means of financial assistance.

Page 17: €¦ · 2 Table of Contents Introduction

17

Student Information

Certification Exams

Certifications are not part of the training process, as they are obtained through a third-party vendor. It is the choice of the student whether they will achieve this or not. New Horizons Computer Learning Center teaches the material to assist in but not guarantee the passing of industry certification exams. New Horizons has no control over choice of material or alterations of material for certification examination, and therefore, cannot be held responsible. Certification exams are not included in the tuition price unless specified on the Enrollment Agreement. Students may purchase the exams separately and test for the exams at any Testing Center Location. Test preparation packages and voucher fees are non-refundable. For your convenience New Horizons Computer Learning Center is a Prometric, Pearson Vue, Certiport and Kryterion testing center. Please be aware that unused vouchers and measure ups can be redeemed from New Horizons up to 6 months after graduation or withdrawal. To request an exam voucher you must first achieve a 90% passing score in certification mode on test preparation software.

Courseware

All courseware materials are provided at no cost with the purchase of the training program tuition.

Student Perks

Page 18: €¦ · 2 Table of Contents Introduction

18

Information Technology and Healthcare Information Programs

● ● ● ● ● ● ● ● ●

Information

Technology and

Healthcare Information

Programs ● ● ● ● ● ● ● ● ●

Page 19: €¦ · 2 Table of Contents Introduction

19

MIS Network Administrator Educational objectives:

The MIS Network Administrator Program was developed for the student to prepare for the certification tests necessary to become a Microsoft Certified Solutions Expert (MCSE). We have also included computer labs to further support the student’s learning experience. In the MIS Network Administrator program, the student is taught the skills to work in a cross platform or mixed Windows server environment. Upon completion of this program, students will have obtained the skills necessary to implement, deploy, manage, maintain and provision a Windows Server Infrastructure, with Active Directory, Group Policy, and Hyper-V services. Additionally, instruction is provided on supporting, installing, and troubleshooting Windows Operating Systems. Students gain the skills necessary to design, develop, implement, and manage/configure network services using Windows technologies. Students will have the option to pursue industry certifications: Network+, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE), and Cisco Certified Network Associate: Routing and Switching (CCNA). Utilizing our state of the art Break Out room, students gain hands on experience with hardware, software, servers, networking, switches and routers. After completion of the MIS Network Administrator program, a student will be qualified for a position as a Computer Support Specialist, Computer Systems Analyst, Customer service representative, Call Center Support, Teleservice Operations, Technical Support Specialist, Help Desk Technician, Hardware Specialist, Network & Computer Systems Administrator, PC Technician, Desktop Support Technician, Network Support Technician, MIS Administrator, Security Administrator, IT Network Manager, Windows Administrator and LAN/WAN Administrator. Admission Requirements:

This program requires a high school diploma or GED. In addition, students must take a

Wonderlic Verbal Skills test and score a 297 or above and take the Computer Competency test

and score above an 80% to qualify for entrance in the MIS Network Administrator Program.

Upon successful completion of all courses entailed, the student will graduate from the MIS

Network Administrator Program and receive a diploma.

Course Tuition: $19,198 Total Hours: 736 Hours Grading Scale: A= 100-93 B= 92-83 C= 82-73 D= 72-63 F= Below 62 I= Incomplete W= Withdrew

Page 20: €¦ · 2 Table of Contents Introduction

20

COURSE TITLE: Network+ Networking Fundamentals

PREREQUISITE: None

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day

or evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to perform tasks such as:

Installation

Configuration

Diagnosing

Preventative maintenance

Basic networking

COURSE OBJECTIVES: CompTIA Network+ validates the ability to select, connect, configure and troubleshoot basic network hardware, including wireless technology. Employees, customers, and potential clients depend on their network. Employing those CompTIA Network+ certified help keep this vital part of business up and running. This course is intended for entry-level computer support professionals with basic knowledge of computer hardware, software, and operating systems, who wish to increase their knowledge and understanding of networking concepts and skills to prepare for a career in network support or administration, or to prepare for the CompTIA Network+ N10-005 certification.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Axzo Press (2012) CompTIA Network+ Certification, Exam N10-005 + CertBlaster, Student Manual, Axzo Press

Publishing

Networking Cable

Switch

Router

Virtual PC

2 – “A+ machines”

INSTRUCTIONAL STRATEGIES: This course combines theory instruction with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations.

COURSE OUTLINE:

Objective 1.1 - The OSI and TCP/IP Models 4hr

OSI Layer 7

OSI Layer 6

OSI Layer 5

OSI Layer 4

OSI Layer 3

OSI Layer 2

OSI Layer 1

LAN Compared with the OSI Model

TCP/IP Architecture

Demo - OSI Review

Objective 1.1 Review Lab: Compare TCP/IP to other protocols 2hr

NH5200 Network + Networking

Fundamentals 104 Total Hours

66 Theory Hours

38 Laboratory Hours

Page 21: €¦ · 2 Table of Contents Introduction

21

Objective 1.2 - Applications, Devices, Protocols 4hr

Classifying Network Components

Objective 1.2 Review

Objective 1.3 - IP Addressing 4hr

MAC Address

IPv4

Classful IPv4 Addresses

Subnet Masks

Network IDs

Special Addresses

CIDR

CIDR Address

APIPA

IPv6

IPv6 Address Types

IPv6 Address Scopes

Demo - Convert Binary

IPv4 Subnet Masks

IPv4 Custom Subnets

IPv6 Subnets

IPv6 Custom Subnets

Default Gateway

Routing Example

IPCONFIG and IFCONFIG

Demo - Examining IP Settings

Objective 1.3 Review

Objective 1.4 - Routing and Switching 5hr

Internetworking Devices

Ethernet Hub

Repeaters

Repeater Placement

Wireless Repeater

Repeater Operation

Limitations of Repeaters

Bridges

Bridge Operation

Bridge Types

Bridge Routing Management

Bridge Filtering and Intelligence

Local and Remote Bridges

Layer 2 Switch

Configurations for Switched Networks

Switched Network with Bottlenecks

Switched Network without Bottlenecks

Benefits of Switches

Higher-level Switches

Managed Layer 3 Switch

Page 22: €¦ · 2 Table of Contents Introduction

22

Virtual LAN

VLAN Filtering

VLAN Trunking

Trunking Example

Demo - Intro to Routing and Switching VLANs

Routers

Router Operation

About Routers

Router Features

Key Points

Types of Routers

Routing Table Contents

Routing Metrics

Routing Examples

Brouters

Bridges vs. Routers

Objective 1.4 Review Lab: Examine Router and Switch Functions 4hr

Objective 1.5 - TCP and UDP Ports 1hr

Transport-layer Protocols

Port Addresses

Service Port Numbers

Demo - Port Numbers

Demo - netstat

Objective 1.5 Review

Objective 1.6 - Protocols 4hr

Network Communication Protocols

TCP

TCP Three-way Handshake

Internet Protocol (IP)

UDP

Protocols

Demo - Examining Ports and Protocols

Objective 1.6 Review

Objective 1.7 - The Domain Name System 1hr

DNS

Top-level Domains

DNS Namespace

DNS Records

Demo - Examining DNS

Objective 1.7 Review

Objective 1.8 - Troubleshooting Methodology 1hr

Troubleshooting

Hardware Toolkit

Additional Tools

Page 23: €¦ · 2 Table of Contents Introduction

23

Software Toolkit

Objective 1.8 Review

Objective 1.9 - Virtual Networks 1.5hr

Virtual Computers

Virtualization Concerns and Risks

Demo - Viewing VM Components

Cloud Computing

Cloud Deployment

Cloud Categories

Risks and Concerns

Objective 1.9 Review

Objective 2.1 - Installing and Configuring Routers and Switches 1.5hr

Installing Routers and Switches

Demo - Routing NAT

Objective 2.1 Review Lab: Troubleshoot Network Connectivity 3hr

Lab: Create a Virtual Network 4 hr

Lab: Connectivity Methods 4 hr

Objective 2.2 - Installing and Configuring Wireless Networks 1hr

The 802.11 Standard

The 802.11 Family

802.11 Networking

Configuration Options

Configuring Wireless Clients

RADIUS

Demo - Setting Up Wi-Fi

Objective 2.2 Review

Objective 2.3 – DHCP 1hr

Static IP Addressing

DHCP and DHCPv6

IPv4 Lease Process

IPv6 Lease Process

IPv6 Router Flags

M and O Flags

Demo - DHCP

Objective 2.3 Review.

Objective 2.4 - Troubleshooting Wireless Networks 2.5hr

Troubleshooting Connections

Common Problems

Objective 2.4 Review

Objective 2.5 - Troubleshooting Router and Switch Problems 2hr

Common Problems

Demo - Troubleshooting a Switch

Demo - Troubleshooting a Router

Page 24: €¦ · 2 Table of Contents Introduction

24

Objective 2.5 Review

Objective 2.6 - Planning and Implementing a SOHO Network 1hr

Purposes of a Plan

Creating a Plan

Ongoing Planning

Implementing a Plan

Network Cable

Objective 2.6 Review

Objective 3.1 - Standard Media Types 1.5hr

Fiber Optic Cable

Twisted-pair Cable

Common UTP Categories

Additional TP Categories

Stranded vs. Solid

Straight-through, Cross-over, Rollover

Pin Numbering of RJ-45 Connector

T1 Crossover Cable

Coaxial Cable

RG Standards

Plenums

Media Converters

Single-mode Fiber to UTP

Broadband Over Power Line

Access BPL

BPL Modem

Objective 3.1 Review

Objective 3.2 - Standard Connector Types 1hr

Fiber Optic Connectors

Fiber Optic Connector Types

Twisted-pair Connectors

Pin Numbering of RJ-45 Connector

Thinnet Connectors

Terminating Coax with BNC

RG-6 and RG-59 Connectors

Serial Connectors

Serial Cable

Serial Console Connections

Serial Cable Types

Serial Data Rates

Typical UTP Installation

Telecommunications Room

Termination Choices

Punchdown Block

Wire Placement

Objective 3.2 Review

Page 25: €¦ · 2 Table of Contents Introduction

25

Objective 3.3 - Wireless Standards 1.5hr

The 802.1x Standard

The 802.11 Standard

Access Point

Major Wireless Protocols

Device Compatibility

Channels

Channel Bonding

MIMO

Objective 3.3 Review

Objective 3.4 - WAN Technologies 4hr

Wide Area Networks

Packet vs. Circuit Switching

Demo - Packet Switching

WAN Connections

POTS/PSTN

ISDN

DSL

Cable

Satellite

Wireless

WiMAX

Cellular

T and E Lines

X.25 and Frame Relay

ATM

SONET and SDH

DWDM

PON

Objective 3.4 Review

Objective 3.5 - Network Topologies 2hr

Local Area Networks

Network Topologies

Logical Network Topologies

Peer-to-peer Model

Decentralized

Peer-to-peer Authentication

Client/Server Model

A Client/Server LAN

Client/Server Authentication

Star Topology

Bus Topology

Ring Topology

Mesh Topology

Hybrid Topology

Point-to-point vs. Point-to-multipoint

MPLS

Page 26: €¦ · 2 Table of Contents Introduction

26

Label Edge Routers

Demo - Topology

Objective 3.5 Review

Objective 3.6 - Troubleshooting Physical Connectivity .5hr

Troubleshooting Wired Connections

Cable Testing Devices

Physical Cable Tests

Objective 3.6 Review

Objective 3.7 - LAN Technologies 2hr

Ethernet

Ethernet Media

10-Gigabit Ethernet Standards

Gigabit Ethernet Standards

Fast Ethernet Standards

10BASE-T

Ethernet Bonding

Data Transmission

Data Collisions

Channel Access Methods

Demo - LAN Cable Types

Objective 3.7 Review

Objective 3.8 - Wiring Distribution Components 1hr

Network Access Points

Demo - Packet Tracing

Internet Service Providers (ISPs)

Small ISPs

Regional ISP

LAN Installation Components

Cross-connects

MDF to IDF Connections

Standards

Workstation Drops

Typical UTP Installation

Telecommunications Room

Objective 3.8 Review

Objective 4.1 - Network Appliances .5hr

Networking Appliances

Demo - The Purpose of Network Devices

Objective 4.1 Review

Objective 4.2 - Network Hardware Tools 2hr

Cable Testing Device

Physical Cable Tests

Network Function Tests

Cable Certifier

Additional Features

Page 27: €¦ · 2 Table of Contents Introduction

27

Testing a Basic Permanent Link

Crimpers

Coax Crimper

Twisted-pair Cable Crimper

Using a Fiber Optic Cable Crimper

Terminating Fiber Optic Cable

Butt Set

Butt Set Uses

Modapt Device

Toner Probe

Using a Toner Probe

Punchdown Tools

Using a Punchdown Tool

Network Analyzer

Loopback Plugs

TDR

OTDR

Multimeters

Measuring Resistance

Measuring Voltage

Measuring Current

Measuring Continuity

Environmental Monitor

ASHRAE 9.9 Guidelines

Objective 4.2 Review Lab: Create and Test Network Cable 3hr

Objective 4.3 - Network Software Tools 1.5hr

Network Analyzer

TCP/IP Utilities

IPConfig

Ifconfig

Ping (Packet Internet Groper)

Ping Troubleshooting

NSLookup and Tracert

Demo - Software Tools

Objective 4.3 Review Lab: TCP/IP Connectivity & Command Line Troubleshooting 2.5hr

Objective 4.4 - Monitoring Network Traffic 1hr

Performance Monitor

Performance Objects

Bottlenecks

Demo - Performance and Monitoring

Configuration

Event Viewer

Event Information

Event Types

Device and Application Logging

Page 28: €¦ · 2 Table of Contents Introduction

28

Syslog

Syslog Alert Levels

SNMP

Network Monitor

Demo - Network Monitoring

Objective 4.4 Review Lab: Capturing Network Traffic by Using Network Monitor 1.5hr

Lab: Performance Monitor 1hr

Objective 4.5 - Management Documentation .5hr

Change Management

Configuration Documentation

Objective 4.5 Review

Objective 4.6 - Optimizing Network Performance .5hr

Rationales

Methods

Objective 4.6 Review

Objective 5.1 - Implementing Wireless Security .5hr

Wireless Security

Transmission Encryption

Demo - Wireless Security

Objective 5.1 Review Lab: Configuring a Wireless Access Point 1.5hr

Objective 5.2 - Network Access Security Methods 2hr

Network Access Control

Access Control Lists

VPN Technologies

VPN Security Models

VPN Protocols

PPTP vs. L2TP

IPSec Protocols

IPSec Encryption

PPPoE

Remote Desktop Services

SSH

Demo - Network Security

Objective 5.2 Review Lab: Viewing the Event Logs 1.5hr

Objective 5.3 - User Authentication 3hr

AAA

Authentication Factors

One-factor Authentication

Two-factor Authentication

Three-factor Authentication

Single Sign-on

Kerberos

Page 29: €¦ · 2 Table of Contents Introduction

29

Kerberos System Components

Kerberos Data Types

Kerberos Authentication Process

CHAP

EAP

PPPoE

Mutual Authentication

Cryptography

ROT13 Cipher

Keys

Symmetric Encryption in Action

Public Key Cryptography

Asymmetric Encryption in Action

Demo - Encryption

Public Key Cryptography

Public Key Infrastructure

Setup and Initialization Phase

RADIUS

RADIUS Authentication

TACACS+

TACACS+ vs. RADIUS

802.1x

Objective 5.3 Review

Objective 5.4 - Network Security Threats 4hr

Topic A: Attacks and Threats

Wireless Security Threats

Vulnerabilities of Access Points

Wi-Fi Scanners

War Chalking Symbols

Denial-of-Service Attacks

Distributed DoS Attacks

DDoS Countermeasures

Man-in-the-Middle Attacks

Buffer Overflow

FTP Bounce Attacks

Smurf Attacks

Malware

Social Engineering

Attack Types

Social Engineering Countermeasures

Topic B: Mitigation

Antivirus Software

Securing the Operating System

Windows Update

Updates

Patch Management

Security Policies

Page 30: €¦ · 2 Table of Contents Introduction

30

Acceptable Use

Due Care

Privacy

Separation of Duties

Need to Know

Password Management

Account Expiration

Service-level Agreement

Disposal and Destruction

Human Resources Policies

Incident Response Policy

Preparation

Detection

Containment

Eradication

Recovery

Follow-up

Education

Communication

User Awareness

Demo - Vulnerability

Objective 5.4 Review

Objective 5.5 - Installing and Configuring a Firewall 1hr

Firewalls and Proxies

Firewall Categories

Security Zones

Intranet Zone

Perimeter Network

DMZ Options

Screened Host

Bastion Host

Three-homed Firewall

Back-to-back Firewalls

Dead Zone

Traffic Filtering

NAT and PAT

Port Address Translation

Firewall Administration

Rule Planning

Demo - Firewall Rules

Port Security

Objective 5.5 Review Lab: Configuring Firewall Rules 1.5hr

Objective 5.6 - Network Security Appliances and Methods 1.5hr

Assessment Types

Vulnerability Assessments

Vulnerability Testing Tools

Page 31: €¦ · 2 Table of Contents Introduction

31

Demo - Scanning

Intrusion Detection

Events

NIDS

IDScenter for Snort

Example Snort Rule

HIDS

Advantages of HIDS over NIDS

Honeypots and Honeynets

Honeypot Examples

Honeypot Deployment

Objective 5.6 Review

Course Closure Lab: Create a Network 4hr

Lab: Join a Domain 2hr

Lab: Updating the Operating System 2.5hr

NH62-9293

Installing, Managing &

Troubleshooting Windows 7

Desktop and Intro to Windows 8

104 Total Hours

73 Theory Hours

31 Lab Hours

COURSE TITLE: Installing, Managing & Troubleshooting Windows 7 Desktop and Intro to Windows 8

PREREQUISITE: None

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day

or evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Perform a clean installation of Windows 7, upgrade to Windows 7, and migrate user-related data and

settings from an earlier version of Windows.

Configure disks, partitions, volumes, and device drivers to enable a Windows 7 client computer.

Configure file access and printers on a Windows 7 client computer.

Configure network connectivity on a Windows 7 client computer.

Configure wireless network connectivity on a Windows 7 client computer.

Secure Windows 7 client desktop computers.

Optimize and maintain the performance and reliability of a Windows 7 client computer.

Configure mobile computing and remote access settings for a Windows 7 client computer.

Students will be exposed to various troubleshooting tools and techniques that enable them to address the

following Windows 7 issues in an enterprise network environment: Startup, Group Policy, Hardware and

device driver, performance, network connectivity, remote connectivity, user profile and logon, security, and

applications.

Navigate the Windows 8 User Interface including using modern applications, internet explorer, and security

features.

COURSE OBJECTIVES: This course is intended for IT professionals who are interested in expanding their

knowledge base and technical skills about Windows 7 Client. In this course, students learn how to install, upgrade,

and migrate to Windows 7 client. Students then configure Windows 7 client for network connectivity, security,

maintenance, and mobile computing. The goal of this training is to enable these individuals to support the Windows

7 operating system and solve technical troubleshooting problems in a Windows 7 and Windows Server 2008 R2

networking environment. This course also provides students with an introduction to personal computers using the

Microsoft Windows 8 operating system.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Page 32: €¦ · 2 Table of Contents Introduction

32

Microsoft Official Courseware (MOC) - Installing and Configuring Windows® 7 Client - Course 6292AC (Class

Pack) – Arvato Publishing

Microsoft Official Courseware (MOC) - Troubleshooting and Supporting Windows® 7 in the Enterprise - Course

6293AC (Class Pack) – Arvato Publishing

Logical Operations (2013): Using Windows 8. Logical Operations Publishing

Windows 7 Software

Windows 8 Software

Virtual PC

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations.

COURSE OUTLINE:

Module 1: Installing, Upgrading, and Migrating to Windows 7 4 hrs.

Preparing to Install Windows 7

Performing a Clean Installation of Windows 7

Upgrading and Migrating to Windows 7

Performing Image-based Installation of Windows 7

Configuring Application Compatibility

Lab: Installing and Configuring Windows 7 1.5hrs Module 2: Configuring Disks and Device Drivers 4 hrs.

Partitioning Disks in Windows 7

Managing Disk Volumes

Maintaining Disks in Windows 7

Installing and Configuring Device Drivers

Lab: Configuring Disks and Device Drivers 1.5 hrs.

Module 3: Configuring File Access and Printers on Windows® 7 Clients 4 hrs.

Overview of Authentication and Authorization

Managing File Access in Windows 7

Managing Shared Folders

Configuring File Compression

Managing Printing

Lab: Configuring File Access and Printers on Windows 7 Client Computers 1.5 hrs.

Module 4: Configuring Network Connectivity 4 hrs.

Configuring IPv4 Network Connectivity

Configuring IPv6 Network Connectivity

Implementing Automatic IP Address Allocation

Overview of Name Resolution

Troubleshooting Network Issues

Lab: Configuring Network Connectivity 1.5hrs.

Module 5: Configuring Wireless Network Connections 4 hrs

Overview of Wireless Networks

Configuring a Wireless Network

Lab: Configuring Wireless Network Connections 1.5hrs

Module 6: Securing Windows 7 Desktops 4 hrs

Overview of Security Management in Windows 7

Securing a Windows 7 Client Computer by Using Local Security Policy Settings

Page 33: €¦ · 2 Table of Contents Introduction

33

Securing Data by Using EFS and BitLocker

Configuring Application Restrictions

Configuring User Account Control

Configuring Windows Firewall

Configuring Security Settings in Internet Explorer 8

Configuring Windows Defender

Lab A: Configuring UAC, Local Security Policies, EFS, and AppLocker 1.5hrs

Lab B: Configuring Windows Firewall, Internet Explorer 8 Security Settings, and Windows Defender .

Module 7: Optimizing and Maintaining Windows 7 Client Computers 4 hrs.

Maintaining Performance by Using the Windows 7 Performance Tools Maintaining Reliability by Using the Windows 7 Diagnostic Tools

Backing Up and Restoring Data by Using Windows Backup

Restoring a Windows 7 System by Using System Restore Points

Configuring Windows Update

Lab: Optimizing and Maintaining Windows 7 Client Computers 1.5 hrs.

Module 8: Configuring Mobile Computing and Remote Access in Windows 7 4 hrs.

Configuring Mobile Computer and Device Settings

Configuring Remote Desktop and Remote Assistance for Remote Access

Configuring DirectAccess for Remote Access

Configuring BranchCache for Remote Access

Lab: Configuring Mobile Computing and Remote Access in Windows 7 1.5 hrs.

Module 9: Implementing a Troubleshooting Methodology 4hrs

Introduction to the EDST Job Role

Overview of Troubleshooting Steps

Module 10: Troubleshooting Startup Issues 4hrs

Overview of the Windows 7 Recovery Environment

Configuring and Troubleshooting Startup Settings

Troubleshooting Operating System Services Issues

Lab : Troubleshooting Startup Issues 1.5hrs

Module 11: Using Group Policy to Centralize Configuration 4hrs

Overview of Group Policy Application

Resolving Client Configuration Failures and GPO Application Issues

Lab : Using Group Policy to Centralize Configuration 1.5hrs

Module 12: Troubleshooting Hardware Device, Device Driver, and Performance Issues 4hrs

Overview of Hardware Troubleshooting

Troubleshooting Physical Failures

Monitoring Reliability and Performance

Configuring Performance Options in Windows 7

Troubleshooting Device Driver Failures

Lab : Lab A: Resolving Hardware Device and Device Driver Issues 1.5hrs

Lab : Lab B: Troubleshooting Performance-Related Issues 1.5hrs

Module 13: Troubleshooting Network Connectivity Issues 3hrs

Determining Network Settings

Page 34: €¦ · 2 Table of Contents Introduction

34

Troubleshooting Network Connectivity Issues

Lab : Troubleshooting Network Connectivity Issues 1.5hrs

Module 14: Troubleshooting Remote Connectivity Issues 4hr

Troubleshooting VPN Connectivity Issues

Using Remote Desktop

Troubleshooting User Issues by Using Remote Assistance

Troubleshooting NAP Issues

Troubleshooting DirectAccess Issues

Lab : Resolving Remote Connectivity Issues 1.5hrs

Module 15: Troubleshooting Logon and Resource Access Issues 3hrs

Troubleshooting User Logon Issues

Troubleshooting User Profile Issues

Troubleshooting File Access Issues

Troubleshooting File Permissions Issues

Troubleshooting Printer Access Issues

Lab : Troubleshooting Logon and Resource Access Issues 1.5hrs

Module 16: Troubleshooting Security Issues 3hrs

Recovering Files Encrypted by EFS

Recovering BitLocker-Protected Drives

Troubleshooting Internet Explorer and Content Access Issues

Lab : Troubleshooting Security Issues 1.5hrs

Module 17: Troubleshooting Operating System and Application Issues 4hrs

Troubleshooting Application Installation Issues

Troubleshooting Application Operations Issues

Applying Application and Windows Updates

Lab : Troubleshooting Operating System and Application Issues 1.5hrs

Module 18: Getting to Know PCs and the Windows 8 User Interface 1hr

Identify Components of a Personal Computer

Sign In to Windows 8

Navigate the Start Screen

Lab: Getting to Know PCs and the Windows 8 User Interface 1hr

Module 19: Using Modern Apps and Navigation Features 1hr

Access and Identify the Charms

Modern Apps and Common Navigation Features

Multitasking with Apps

Lab: Using Modern Apps and Navigation Features 1hr

Module 20: Working with Desktop Applications 2hr

Page 35: €¦ · 2 Table of Contents Introduction

35

Navigate the Desktop

Manage Files and Folders with File Explorer

Elements of a Desktop Window

Lab: Working with Desktop Applications .5hr

Module 21: Using Internet Explorer 10 2hr

Navigate Internet Explorer 10

Browse the Web

Lab: Using Internet Explorer 10 .5hr

Module 22: Customizing the Windows 8 Environment 1hr

Customize the Start Screen

Customize the Desktop

Lab: Customizing the Windows 8 Environment 1hr

Module 23: Using Windows 8 Security Features 1hr

Set Privacy Levels and Passwords

Use Windows Defender

Store and Share Files with SkyDrive

Lab: Using Windows 8 Security Features .5hr

Lab: Using Windows 8 1hr

NH204-1011

Installing, Configuring & Administrating Windows

Server 2012

136 Total Hours

104 Theory Hours

32 Lab Hours

COURSE TITLE: Installing, Configuring & Administrating Windows Server 2012 PREREQUISITE: NH62-9293, or equivalent knowledge and skills

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 136 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Install and Configure Windows Server 2012.

Describe AD DS.

Manage Active Directory objects.

Automate Active Directory administration.

Implement IPv4.

Implement Dynamic Host Configuration Protocol (DHCP).

Implement Domain Name System (DNS).

Implement IPv6.

Implement local storage.

Share files and printers.

Page 36: €¦ · 2 Table of Contents Introduction

36

Implement Group Policy.

Use Group Policy Objects (GPOs) to secure Windows Servers.

Implement server virtualization using Hyper-V.

Deploy and Maintain Server Images

Configure and Troubleshoot DNS

Maintain Active Directory Domain Services (AD DS).

Manage User and Service Accounts

Implement a Group Policy Infrastructure

Manage User Desktops with Group Policy

Configure and Troubleshoot Remote Access

Install, Configure and Troubleshoot Network Policy Server (NPS) role

Implement Network Access Protection (NAP)

Optimize File Services

Configure Encryption and Advanced Auditing

Implement Update Management

Monitor Windows Server 2012

COURSE OBJECTIVES: This course provides the skills and knowledge necessary to implement a core Windows

Server 2012 infrastructure in an existing enterprise environment. The course covers implementing, managing,

maintaining, and provisioning services and infrastructure in a Windows Server 2012 environment. This course

primarily covers the initial implementation and configuration of core services including Active Directory Domain

Services (AD DS), networking services, and Microsoft Hyper-V Server 2012 configuration, and the administration

tasks necessary to maintain a Windows Server 2012 infrastructure such as Implementing Server Images, User and

Group management with Active Directory Domain Services(AD DS) and Group Policy, Remote Access and

Network Policies, Data Security, Monitoring and Update Management

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2013): Installing and Configuring Windows Server® 2012 – Microsoft Publishing

Arvato Bertelsmann (2013): Administering Windows Server® 2012 – Microsoft Publishing

Microsoft Server 2012 Software

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations.

COURSE OUTLINE:

Module 1: Deploying and Managing Windows Server 2012 4hrs

Windows Server 2012 Overview

Overview of Windows Server 2012 Management

Installing Windows Server 2012

Post-Installation Configuration of Windows Server 2012

Introduction to Windows PowerShell

Lab : Deploying and Managing Windows Server 2012 1hrs

Module 2: Introduction to Active Directory Domain Services 4hrs

Overview of AD DS

Overview of Domain Controllers

Installing a Domain Controller

Page 37: €¦ · 2 Table of Contents Introduction

37

Lab : Installing Domain Controllers 1hrs

Module 3: Managing Active Directory Domain Services Objects 4hrs

Managing User Accounts

Managing Group Accounts

Managing Computer Accounts

Delegating Administration

Lab : Managing Active Directory Domain Services Objects 1hr

Module 4: Automating Active Directory Domain Services Administration 4hrs

Using Windows PowerShell for AD DS Administration

Performing Bulk Operations with Windows PowerShell

Lab : Automating AD DS Administration by Using Windows PowerShell 1hr

Module 5: Implementing IPv4 4hrs

Overview of TCP/IP

Understanding IPv4 Addressing

Subnetting and Supernetting

Configuring and Troubleshooting IPv4

Lab : Implementing IPv4 1hr

Module 6: Implementing Dynamic Host Configuration Protocol 4hrs

Installing a DHCP Server Role

Configuring DHCP Scopes

Managing a DHCP Database

Securing and Monitoring DHCP

Lab : Implementing DHCP 1hr

Module 7: Implementing Domain Name System 4hrs

Name Resolution for Windows Client and Servers

Installing and Managing a DNS Server

Managing DNS Zones

Lab : Implementing DNS 1hr

Module 8: Implementing IPv6 4hrs

Overview of IPv6

IPv6 Addressing

Coexistence with IPv6

IPv6 Transition Technologies

Lab : Implementing IPv6 1hr

Module 9: Implementing Local Storage 4hrs

Overview of Storage

Managing Disks and Volumes

Implementing Storage Spaces

Lab : Implementing Local Storage 1hr

Module 10: Implementing File and Print Services 4hrs

Page 38: €¦ · 2 Table of Contents Introduction

38

Securing Files and Folders

Protecting Shared Files and Folders by Using Shadow Copies

Configuring Network Printing

Lab : Implementing File and Print Services 1hr

Module 11: Implementing Group Policy 4hrs

Overview of Group Policy

Group Policy Processing

Implementing a Central Store for Administrative Templates

Lab : Implementing Group Policy 1hr

Module 12: Securing Windows Servers Using Group Policy Objects 4hrs

Windows Operating Systems Security Overview

Configuring Security Settings

Restricting Software

Configuring Windows Firewall with Advanced Security

Lab : Increasing Security for Server Resources 1hr

Lab : Configuring AppLocker and Windows Firewall 1hr

Module 13: Implementing Server Virtualization with Hyper-V 4hrs

Overview of Virtualization Technologies

Implementing Hyper-V

Managing Virtual Machine Storage

Managing Virtual Networks

Lab : Implementing Server Virtualization with Hyper-V 1hr

Module 14: Deploying and Maintaining Server Images 4hrs

Overview of Windows Deployment Services

Implementing Deployment with Windows Deployment Services

Administering Windows Deployment Services

Lab : Using Windows Deployment Services to Deploy Windows Server 2012 1hr

Module 15: Configuring and Troubleshooting Domain Name System 4hrs

Installing the DNS Server Role

Configuring the DNS Server Role

Configuring DNS Zones

Configuring DNS Zone Transfers

Managing and Troubleshooting DNS

Lab : Configuring and Troubleshooting DNS 1hr

Module 16: Maintaining Active Directory Domain Services 4hrs

Overview of AD DS

Implementing Virtualized Domain Controllers

Implementing RODC

Administering AD DS

Managing the AD DS Database

Lab : Maintaining AD DS 1hr

Module 17: Managing User and Service Accounts 4hrs

Page 39: €¦ · 2 Table of Contents Introduction

39

Automating User Account Management

Configuring Password-Policy and User-Account Lockout Settings

Configuring Managed Service Accounts

Lab : Managing User and Service Accounts 1hr

Module 18: Implementing a Group Policy Infrastructure 4hrs

Introducing Group Policy

Implementing and Administering Group Policy Objects (GPOs)

Group Policy Scope and Group Policy Processing

Troubleshooting the Application of GPOs

Lab : Implementing a Group Policy Infrastructure 1hr

Module 19: Managing User Desktops with Group Policy 4hrs

Implementing Administrative Templates

Configuring Folder Redirection and Scripts

Configuring Group Policy Preferences

Managing Software with Group Policy

Lab : Managing User Desktops with Group Policy 1hr

Module 20: Configuring and Troubleshooting Remote Access 4hrs

Configuring Network Access

Configuring Virtual Private Network (VPN) Access

Overview of Network Policies

Troubleshooting Routing and Remote Access

Configuring DirectAccess

Lab : Configuring Remote Access 1hr

Lab : Configuring DirectAccess 1hr

Module 21: Installing, Configuring, and Troubleshooting the Network Policy Server Role 4hrs

Installing and Configuring a NPS

Configuring Remote Authentication Dial-In User Service (RADIUS) Clients and Servers

NPS Authentication Methods

Monitoring and Troubleshooting a NPS

Lab : Installing and Configuring a Network Policy Server 1hr

Module 22: Implementing Network Access Protection 4hrs

Overview of Network Access Protection

Overview of NAP Enforcement Processes

Configuring NAP

Monitoring and Troubleshooting NAP

Lab : Implementing NAP 1hr

Module 23: Optimizing File Services 4hrs

Overview of FSRM

Using FSRM to Manage Quotas, File Screens, and Storage Reports

Implementing Classification and File Management Tasks

Overview of Distributed File System (DFS)

Configuring DFS Namespaces

Page 40: €¦ · 2 Table of Contents Introduction

40

Configuring and Troubleshooting Distributed File System Replication (DFS-R)

Lab : Configuring Quotas and File Screening Using FSRM 1hr

Lab : Implementing DFS 1hr

Module 24: Configuring Encryption and Advanced Auditing 4hrs

Encrypting Files by Using Encrypting File System

Configuring Advanced Auditing

Lab : Configuring Encryption and Advanced Auditing 2hr

Module 25: Implementing Update Management 4hrs

Overview of WSUS

Deploying Updates with WSUS

Lab : Implementing Update Management 2hr

Module 26: Monitoring Windows Server 2012 4hrs

Monitoring Tools

Using Performance Monitor

Monitoring Event Logs

Lab : Monitoring Windows Server 2012 2hr

NH20412

Configuring Advanced Windows Server 2012

Services 104 Total Hours

64 Theory Hours

40 Lab Hours

COURSE TITLE: Configuring Advanced Windows Server 2012 Services PREREQUISITE: NH204-1011, or equivalent knowledge and skills

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Implement advanced network services.

Implement advanced file services.

Implement Dynamic Access Control.

Implement distributed Active Directory Domain Services (AD DS) deployments.

Implement AD DS sites and replication.

Implement Active Directory Certification Services (AD CS).

Implement Active Directory Rights Management Services (AD RMS).

Implement Active Directory Federation Services (AD FS).

Implement network load balancing (NLB).

Implement failover clustering.

Implement failover clustering with Hyper-V.

Implement disaster recovery.

COURSE OBJECTIVES: This course primarily covers advanced configuration of services necessary to deploy,

manage and maintain a Windows Server 2012 infrastructure, such as advanced networking services, Active

Directory Domain Services (AD DS), identity management, rights management, Federated services, network load

balancing, failover clustering, business continuity and disaster recovery.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Page 41: €¦ · 2 Table of Contents Introduction

41

Arvato Bertelsmann (2013): Configuring Advanced Windows Server® 2012 Services – Microsoft Publishing

Microsoft Server 2012 Software

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include THEORY, demonstration, discussion, practical application, simulation and presentations.

Multiple choice assessments are given at the end of each module.

COURSE OUTLINE:

Module 1: Implementing Advanced Network Services 6hrs

Configuring Advanced DHCP Features

Configuring Advanced DNS Settings

Implementing IPAM Lab : Implementing Advanced Network Services 3hrs Module 2: Implementing Advanced File Services 5hrs

Configuring iSCSI Storage

Configuring BranchCache

Optimizing Storage Usage Lab : Implementing Advanced File Services 3hrs Lab : Implementing BranchCache 3hrs Module 3: Implementing Dynamic Access Control 5hrs

Overview of Dynamic Access Control

Planning for Dynamic Access Control

Deploying Dynamic Access Control Lab : Implementing Dynamic Access Control 3hrs Module 4: Implementing Distributed Active Directory Domain Services Deployments 5hrs

Overview of Distributed AD DS Deployments

Deploying a Distributed AD DS Environment

Configuring AD DS Trusts Lab : Implementing Complex AD DS Deployments 4hrs Module 5: Implementing Active Directory Domain Services Sites and Replication 5hrs

Overview of AD DS Replication

Configuring AD DS Sites

Configuring and Monitoring AD DS Replication Lab : Implementing AD DS Sites and Replication 3hrs Module 6: Implementing Active Directory Certificate Services 5hrs

PKI Overview

Deploying CAs

Deploying and Configuring CA Hierarchy

Deploying and Managing Certificate Templates

Implementing Certificate Distribution and Revocation

Managing Certificate Recovery Lab : Deploying and Managing Certificates 3hrs

Page 42: €¦ · 2 Table of Contents Introduction

42

Module 7: Implementing Active Directory Rights Management Services 6hrs

AD RMS Overview

Deploying and Managing an AD RMS Infrastructure

Configuring AD RMS Content Protection

Configuring External Access to AD RMS Lab : Implementing AD RMS 3hrs Module 8: Implementing Active Directory Federation Services 5hrs

Overview of AD FS

Deploying AD FS

Implementing AD FS for a Single Organization

Deploying AD FS in a B2B Federation Scenario Lab : Implementing AD FS 3hrs Module 9: Implementing Network Load Balancing 6hrs

Overview of NLB

Configuring an NLB Cluster

Planning an NLB Implementation Lab : Implementing Network Load Balancing 3hrs Module 10: Implementing Failover Clustering 5hrs

Overview of Failover Clustering

Implementing a Failover Cluster

Configuring Highly Available Applications and Services on a Failover Cluster

Maintaining a Failover Cluster

Implementing a Multi-Site Failover Cluster Lab : Implementing Failover Clustering 3hrs Module 11: Implementing Failover Clustering with Hyper-V 5hrs

Overview of Integrating Hyper-V with Failover Clustering

Implementing Hyper-V Virtual Machines on Failover Clusters

Implementing Hyper-V Virtual Machine Movement

Managing Hyper-V Virtual Environments by Using VMM Lab : Implementing Failover Clustering with Hyper-V 3hrs Module 12: Implementing Disaster Recovery 6hrs

Overview of Disaster Recovery

Implementing Windows Server Backup

Implementing Server and Data Recovery Lab : Implementing Windows Server Backup and Restore 3hrs

NH204-1516

Implementing Desktop Infrastructure and

Applications in Server 2012

136 Total Hours

72 Theory Hours

64 Lab Hours

COURSE TITLE: Implementing Desktop Infrastructure and Applications in Server 2012 PREREQUISITE: NH204-1011 & NH20412 or equivalent knowledge and skills

Page 43: €¦ · 2 Table of Contents Introduction

43

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 136 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Assess and determine desktop deployment options.

Plan an image management strategy.

Implement desktop security.

Capture and manage a desktop operating system image.

Plan and implement User State Migration.

Plan and deploy desktops by using the Microsoft Deployment Toolkit.

Plan and deploying desktops by using System Center 2012 Configuration Manager.

Plan and implement a Remote Desktop Services infrastructure.

Manage user state virtualization for enterprise desktops.

Plan and implement an updates infrastructure to support enterprise desktops.

Protect enterprise desktops from malware and data loss.

Monitoring the performance and health of the desktop infrastructure.

Design an application distribution strategy that is appropriate for an organizational environment.

Diagnose and remediate application compatibility problems for desktop and presentation virtualization-based deployments.

Use Group Policy and Windows Intune to deploy applications to client devices.

Deploy applications centrally using System Center 2012 Configuration Manager SP1.

Configure self-service application deployment using System Center 2012 Configuration Manager SP1, System Center 2012 Service Manager SP1, and Windows Store apps.

Design and deploy Windows Server 2012 roles and features to support presentation virtualization.

Prepare, deploy and manage applications for Remote Desktop, RemoteApp, and Remote Desktop Web Access.

Design and deploy Windows Server 2012 roles and features to support application virtualization.

Virtualize and deploy applications by using App-V and System Center 2012 Configuration Manager SP1.

Plan and configure the appropriate infrastructure to streamline the deployment of software updates to applications, and plan and configure application security.

Plan and implement application upgrades, supersedence, and application coexistence.

Monitor the deployment, performance, and utilization of applications and determine whether current application hosting platforms are meeting business needs.

COURSE OBJECTIVES: This course provides you with the skills and knowledge needed to plan, design, and

implement a Windows 8 desktop infrastructure. The course provides guidance on planning and deploying desktops

by using several technologies such as User State Migration Tool (USMT), Microsoft Deployment Toolkit (MDT),

Virtual Desktop Infrastructure (VDI), and more. Additionally, the course describes how to protect desktops and

monitor their health and performance. You will build the skills you need to design, deploy, and manage a physical

and virtual Windows Server 2012 application management infrastructure, and focus on using Microsoft System

Center 2012 Service Pack 1 (SP1). You will also learn to design, deploy, and manage Windows 8 Enterprise

applications in a physical and virtual environment and in the cloud.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2013): Implementing a Desktop Infrastructure - Microsoft Publishing

Arvato Bertelsmann (2013): Implementing Desktop Application Environments- Microsoft Publishing

Page 44: €¦ · 2 Table of Contents Introduction

44

Microsoft Server 2012 Software

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assessments are given at the end of each module.

COURSE OUTLINE:

Module 1: Assessing and Determining Desktop Deployment Options 6hrs

Overview of the Enterprise Desktop Life Cycle

Assessing Hardware and Infrastructure Readiness for a Desktop Deployment

Using MAP to Assess Deployment Readiness

Overview of Enterprise Desktop Deployment Methods

Volume Activation Technologies for Enterprise Desktops

Lab : Assessing and Determining Desktop Deployment Options 3.5hrs

Module 2: Planning An Image Management Strategy 6hrs

Overview of Windows Image Format

Overview of Image Management

Lab : Planning an Image Management Strategy 3.5hrs

Module 3: Implementing Desktop Security 6hrs

Implementing a Centralized Desktop Security Solution

Planning and Implementing BitLocker

Planning and Implementing EFS

Lab : Configuring Desktop Security 3hrs

Lab : Configuring File Encryption by Using EFS 3hrs

Module 4: Capturing and Managing a Desktop Operating System Image 6hrs

Overview of Windows ADK

Managing Windows PE

Building a Reference Image by Using Windows SIM and Sysprep

Capturing and Servicing a Reference Image

Configuring and Managing Windows DS

Lab : Preparing the Imaging and the Windows PE Environment 3hrs

Lab : Building a Reference Image by Using Windows SIM and Sysprep 3hrs

Lab : Capturing and Servicing a Reference Image 3hrs

Lab : Configuring and Managing Windows DS 3hrs

Module 5: Planning and Implementing User State Migration 6hrs

Overview of User State Migration

Planning User State Migration by Using USMT

Migrating User State by Using USMT

Lab : Planning and Implementing User State Migration 3.5hrs

Lab : Migrating User State by Using Hard-Link Migration 3.5hrs

Module 6: Planning and Deploying Desktops Using the Microsoft Deployment Toolkit 6hrs

Planning for the LTI Environment

Implementing MDT 2012 for LTI

Integrating Windows DS with MDT

Lab : Planning and Deploying Desktops by Using MDT 3.5hrs

Module 7: Planning and Deploying Desktops by Using System Center 2012 Configuration Manager 6hrs

Page 45: €¦ · 2 Table of Contents Introduction

45

Planning the ZTI Environment

Preparing the Site for Operating System Deployment

Building a Reference Image by Using a Configuration Manager Task Sequence

Deploying Client Images by Using MDT Task Sequences

Lab : Preparing the Environment for Operating System Deployment 3.5hrs

Lab : Performing a Zero-Touch Installation by Using MDT and Configuration Manager 3.5hrs

Module 8: Planning and Implementing a Remote Desktop Services Infrastructure 6hrs

Overview of Remote Desktop Services

Planning the Remote Desktop Services Environment

Configuring a Virtual Machine–Based Desktop Infrastructure Deployment

Configuring a Session-Based Desktop Deployment

Extending the Remote Desktop Services Environment to the Internet

Lab : Planning and Implementing a Remote Desktop Services Infrastructure 3.5hrs

Module 9: Managing User State Virtualization For Enterprise Desktops 6hrs

Overview of User State Virtualization

Planning User State Virtualization

Configuring Roaming Profiles, Folder Redirection, and Offline Files

Implementing UE-V

Lab : Managing User State Virtualization for Enterprise Desktops 3.5hrs

Module 10: Planning and Implementing an Updates Infrastructure to Support Enterprise Desktops6hrs

Planning an Updates Infrastructure for the Enterprise

Supporting Software Updates with System Center 2012 Configuration Manager

Managing Updates for Virtual Machines and Images

Using Windows Intune for Managing Software Updates

Lab : Planning and Implementing an Updates Infrastructure to Support Enterprise Desktops 3.5hrs

Module 11: Protecting Enterprise Desktops from Malware and Data Loss 6hrs

Overview of System Center 2012 Endpoint Protection

Configuring System Center 2012 Endpoint Protection Client Settings and Monitoring Status

Using Windows Intune Endpoint Protection

Protecting Desktops by Using DPM

Lab : Implementing Client Endpoint Protection 3.5hrs

Lab : Configuring Data Protection for Client Computer Data 3.5hrs

Module 12: Monitoring the Performance and Health of the Desktop Infrastructure 6hrs

Performance and Health Monitoring for the Desktop Infrastructure

Monitoring VDI

Lab : Monitoring the Performance and Health of the Desktop Infrastructure 4hrs

NH70-0002 Interconnecting Cisco

Network Devices 152 Total Hours

80 Theory Hours

72 Lab Hours

COURSE TITLE: Interconnecting Cisco Network Devices

Page 46: €¦ · 2 Table of Contents Introduction

46

PREREQUISITE: NH5200, or equivalent knowledge and skills

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 152 total hours

COURSE OVERVIEW: After completing this course, students will be able to:

Describe how networks function, identifying major components, function of network components and the Open System Interconnection (OSI) reference model.

Using the host-to-host packet delivery process, describe issues related to increasing traffic on an Ethernet LAN and identify switched LAN technology solutions to Ethernet networking issues.

Describes the reasons for extending the reach of a LAN and the methods that can be used with a focus on RF wireless access.

Describes the reasons for connecting networks with routers and how routed networks transmit data through networks using TCP / IP.

Describe the function of Wide Area Networks (WANs), the major devices of WANs, and configure PPP encapsulation, static and dynamic routing, PAT and RIP routing.

Use the command-line interface to discover neighbors on the network and managing the router’s startup and configuration.

Describe how networks function, identifying major components, function of network components and the Open System Interconnection (OSI) reference model.

Using the host-to-host packet delivery process, describe issues related to increasing traffic on an Ethernet LAN and identify switched LAN technology solutions to Ethernet networking issues.

Describes the reasons for extending the reach of a LAN and the methods that can be used with a focus on RF wireless access.

Describes the reasons for connecting networks with routers and how routed networks transmit data through networks using TCP / IP.

Describe the function of Wide Area Networks (WANs), the major devices of WANs, and configure PPP encapsulation, static and dynamic routing, PAT and RIP routing.

Use the command-line interface to discover neighbors on the network and managing the routers startup and configuration.

Describe how networks function, identifying major components, function of network components and the Open System Interconnection (OSI) reference model.

Using the host-to-host packet delivery process, describe issues related to increasing traffic on an Ethernet LAN and identify switched LAN technology solutions to Ethernet networking issues.

Describes the reasons for extending the reach of a LAN and the methods that can be used with a focus on RF wireless access.

COURSE OBJECTIVES: This course focuses on providing the skills and knowledge necessary to install, operate,

and troubleshoot a small branch office Enterprise network, including configuring a switch, a router, and connecting

to a WAN and implementing network security.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Logical Operations/Gilmore (2013): Interconnecting Cisco Networking Devices, Part 1 v2.0 (ICND2). Cisco

Publishing.

Logical Operations/Gilmore (2013): Interconnecting Cisco Networking Devices, Part 2 v2.0 Student Kit (ICND2).

Cisco Publishing.

Cisco Router

Cisco Switch

Virtual PC

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations.

Page 47: €¦ · 2 Table of Contents Introduction

47

COURSE OUTLINE:

Module 1: Building a Simple Network 8hrs

Exploring the functions of networking

Understanding the Host-to-Host Communication Model

Introducing LANs

Operating Cisco IOS Software

Starting a Switch

Understanding Ethernet and Switch Operation

Troubleshooting Common Switch Media Issues

Lab: Building a Simple Network 4hrs

Module 2: Establishing Internet Connectivity 8hrs

Understanding the TCP/IP Internet Layer

Understanding IP Addressing and Subnets

Understanding the TCP/IP Transport Layer

Exploring the Functions of Routing

Configuring a Cisco Router

Exploring the Packet Delivery Process

Enabling Static Routing

Managing Traffic Using ACLs

Enabling Internet Connectivity

Lab: Managing Cisco Router Startup and Configuration 4hr

Lab: Enabling Static Routing 4hr

Module 3: Managing Network Device Security 8hrs

Securing Administrative Access

Implementing Device Hardening

Implementing Traffic Filtering with ACLs

Lab: Configure and Troubleshoot ACLs 4hrs

Lab: Understanding Cisco Router Security 4hrs

Module 4: Building a Medium-Sized Network 8hrs

Implementing VLANs and Trunks

Routing Between VLANs

Using a Cisco Network Device as a DHCP Server

Introducing WAN Technologies

Introducing Dynamic Routing Protocols

Implementing OSPF

Lab: Build medium network environment 4hrs

Lab: Implement and Route VLANs 4 hrs

Lab: Using a Cisco Router as a DHCP Server 4 hrs

Module 5: Introducing IPv6 8hrs

Introducing Basic IPv6

Understanding IPv6

Configuring IPv6 Routing

Page 48: €¦ · 2 Table of Contents Introduction

48

Lab: IPv6 4hr

Module 5: Implementing Scalable Medium-Sized Networks 8hrs

Review of Previous Topics

Troubleshooting VLAN Connectivity

Building Redundant Switched Topologies

Improving Redundant Switched Topologies with EtherChannel

Understanding Layer 3 Redundancy

Lab: Troubleshoot switched networks 4 hrs

Lab: Troubleshooting Switch Issues 4 hrs

Module 6: Troubleshooting Basic Connectivity 8hrs

Troubleshooting IPV4 Network Connectivity

Troubleshooting IPV46 Network Connectivity

Module 7: Implementing an EIGRP-Based Solution 8hrs

Implementing EIGRP

Troubleshooting EIGRP

Implementing EIGRP for IPv6

Lab: Troubleshoot EIGRP 4hrs

Module 8: Implement Scalable, Multiarea Network, OSPF Solution 8hrs

OSPF Overview

Multiarea OSPF Implementation

Troubleshooting Multiarea OSPF

Examining OSPFv3

Lab: Troubleshoot OSPF 4hrs

Module 9: Wide-Area Networks 8hrs

Understanding WAN Technologies

Configuring Serial Encapsulation

Establishing a WAN Connection Using Frame Relay

Introducing VPN Solutions

Configuring GRE Tunnels

Lab: Establish a WAN Connection 4hrs

Lab: Troubleshoot Frame Relay WANs 4hrs

Module 10: Network Device Management 8hrs

Configuring Network Devices to Support Network Management Protocols

Managing Cisco Devices

Licensing

Lab: Starting and Configuring a Cisco Router 4hrs

Lab: Implementing a WLAN 4hrs

Lab: Implement VLSM 4hrs

Page 49: €¦ · 2 Table of Contents Introduction

49

NH204-1314

Designing and Implementing Server Infrastructure

136 Total Hours

84 Theory Hours

52 Lab Hours

COURSE TITLE: Designing and Implementing Server Infrastructure PREREQUISITE: NH204-1011, NH20412, or NH20417, or equivalent knowledge.

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 136 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Plan a server upgrade and migration.

Plan and implement a server deployment infrastructure.

Design and maintain an IP configuration and address management solution.

Design and implement name resolution.

Design and implement an AD DS forest and domain infrastructure.

Design and implement an Active Directory organizational unit infrastructure.

Design and implement a Group Policy Object (GPO) strategy.

Design and implement an AD DS topology.

Plan and implement storage. Plan and implement file services.

Design and implement network access services.

Design and implement network protection.

Plan and implement server virtualization strategy.

Plan and implement networks and storage for virtualization.

Plan and deploy virtual machines.

Manage a virtual machine deployment.

Plan and implement a server monitoring strategy.

Plan and implement high availability for file services and applications.

Plan and implement a highly available infrastructure using failover clustering.

Plan and implement a server update infrastructure.

Plan and implement a business continuity strategy.

Plan and implement a public key infrastructure (PKI).

Plan and implement an identity federation infrastructure.

Plan and Implement an information rights management infrastructure.

COURSE OBJECTIVES: This course provides you with the skills and knowledge needed to plan, design, and

deploy a physical and logical Windows Server 2012 with Active Directory Domain Services (AD DS) infrastructure.

The course also provides the skills to perform name resolution, application integration, optimization of automate

remediation, and maintenance of network services. Students will learn how to plan and implement some of the more

advanced features available in Windows Server 2012.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2013): Designing and Implementing a Server Infrastructure- Microsoft Publishing

Arvato Bertelsmann (2013): Implementing an Advanced Server Infrastructure - Microsoft Publishing

Microsoft Server 2012 Software

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations.

COURSE OUTLINE:

Module 1: Planning a Server Upgrade and Migration 3.5hrs

Upgrade and Migration Considerations

Page 50: €¦ · 2 Table of Contents Introduction

50

Creating a Server Upgrade and Migration Plan

Planning for Virtualization

Lab : Planning a Server Upgrade and Migration 2hrs

Module 2: Planning and Implementing a Server Deployment Infrastructure 3.5hrs

Selecting an Appropriate Server Imaging Strategy

Selecting a Deployment Automation Strategy

Implementing an Automated Deployment Strategy

Lab : Planning and Implementing a Server Deployment Infrastructure 2hrs

Module 3: Designing and Maintaining an IP Configuration and Address Management Solution 3.5hrs

Designing and Implementing DHCP

Planning and Implementing DHCP Scopes

Planning and Implementing an IPAM Provisioning Strategy

Lab : Designing and Maintaining an IP Configuration and IP Address Management Solution 2hrs

Module 4: Designing and Implementing Name Resolution 3.5hrs

Designing a Domain Name System (DNS) Server Implementation Strategy

Designing the DNS Namespace

Designing and Implementing DNS Zones

Designing and Configuring DNS Zone Replication and Delegation

Optimizing DNS Servers

Designing DNS for High Availability and Security

Lab : Designing and Implementing Name Resolution 2hrs

Module 5: Designing and Implementing an Active Directory Domain Services Forest and Domain

Infrastructure 3.5hrs

Designing an AD DS Forest

Designing and Implementing AD DS Forest Trusts

Designing and Implementing AD DS Domains

Designing DNS Namespaces in AD DS Environments

Designing AD DS Domain Trusts

Lab : Designing and Implementing an Active Directory Domain Services Forest Infrastructure 2hrs

Lab : Designing and Implementing an AD DS Domain Infrastructure 2hrs

Module 6: Designing and Implementing an Active Directory Organizational Unit Infrastructure 3.5hrs

Planning the Active Directory Administrative Tasks Delegation Model

Designing the OU Structure

Designing and Implementing an Active Directory Group Strategy

Lab : Designing and Implementing an Active Directory OU Infrastructure and Delegation Model 2hrs

Module 7: Designing and Implementing a Group Policy Object Strategy 3.5hrs

Gathering the Information Required for a GPO Design

Designing and Implementing GPOs

Designing GPO Processing

Planning Group Policy Management

Lab : Designing and Implementing a Group Policy Object Strategy 2hrs

Module 8: Designing and Implementing an Active Directory Domain Services Topology 3.5hrs

Page 51: €¦ · 2 Table of Contents Introduction

51

Designing and Implementing AD DS Sites

Designing AD DS Replication

Designing the Placement of Domain Controllers

Virtualization Considerations for Domain Controllers

Designing Highly Available Domain Controllers

Lab : Designing and Implementing an Active Directory Domain Services Physical Topology 2hrs

Module 9: Planning and Implementing Storage 3.5hrs

Storage Considerations

Planning and Implementing iSCSI SANs

Storage Spaces in Windows Server 2012

Lab : Planning and Implementing Storage 2hrs

Module 10: Planning and Implementing File Services 3.5hrs

Planning and Implementing DFS

Planning and Implementing BranchCache

Planning and Implementing Dynamic Access Control

Lab : Designing and Implementing File Services 2hrs

Module 11: Designing and Implementing Network Access Services 3.5hrs

Designing and Implementing Remote Access Services

Designing RADIUS Authentication by Using NPS

Designing a Perimeter Network

Planning and Implementing DirectAccess

Lab : Designing and Implementing Network Access Services 2hrs

Module 12: Designing and Implementing Network Protection 3.5hrs

Overview of Network Security Design

Identifying and Mitigating Common Network Security Threats

Designing and Implementing a Windows Firewall Strategy

Designing and Implementing a NAP Infrastructure

Lab : Designing and Implementing Network Protection 2hrs

Module 13: Planning and Implementing a Server Virtualization Strategy 3.5hrs

Overview of System Center 2012 Components

Integrating System Center 2012 and Server Virtualization

Planning and Implementing a Server Virtualization Host Environment

Lab : Planning and Implementing a Server Virtualization Strategy 2hrs

Module 14: Planning and Implementing Networks and Storage for Virtualization 3.5hrs

Planning a Storage Infrastructure for Virtualization

Implementing a Storage Infrastructure for Virtualization

Planning and Implementing a Network Infrastructure for Virtualization

Lab : Planning and Implementing Virtualization Networks and Storage 2hrs

Module 15: Planning and Deploying Virtual Machines 3.5hrs

Planning Virtual Machine Configuration

Preparing for Virtual Machine Deployments with VMM

Deploying Virtual Machines

Page 52: €¦ · 2 Table of Contents Introduction

52

Lab : Planning and Implementing a Virtual Machine Deployment and Management Strategy 2hrs

Module 16: Planning and Implementing a Virtualization Administration Solution 3.5hrs

Planning and Implementing Microsoft System Center Administration

Planning and Implementing Self-Service with System Center

Planning and Implementing Automation with System Center

Lab : Planning and Implementing a Virtualization Administration Solution 2hrs

Module 17: Planning and Implementing a Server Monitoring Strategy 3.5hrs

Planning Monitoring in Windows Server 2012

Overview of System Center Operations Manager

Planning and Configuring Monitoring Components

Configuring Integration with VMM

Lab : Implementing a Server Monitoring Strategy 2hrs

Module 18: Planning and Implementing High Availability for File Services and Applications 3.5hrs

Planning and Implementing Storage Spaces

Planning and Implementing DFS

Planning and Implementing Network Load Balancing

Lab : Planning and Implementing High Availability for File Services and Applications 2hrs

Module 19: Planning and Implementing a Highly Available Infrastructure Using Failover

Clustering 3.5hrs

Planning a Failover Clustering Infrastructure

Implementing Failover Clustering

Integrating Failover Clustering with Server Virtualization

Planning a Multi-Site Failover Cluster

Lab : Planning and Implementing a Highly Available Infrastructure Using Failover Clustering 2hrs

Module 20: Planning and Implementing an Server Updates Infrastructure 3.5hrs

Planning and Implementing a Windows Server Update Services (WSUS) Deployment

Planning Software Updates with System Center 2012 Configuration Manager

Planning and Implementing Updates in a Server Virtualization Infrastructure

Lab : Planning and Implementing an Update Remediation Infrastructure 2hrs

Module 21: Planning and Implementing a Business Continuity Strategy 3.5hrs

Overview of Business Continuity Planning

Planning and Implementing Backup Strategies

Planning and Implementing Recovery

Planning and Implementing Virtual Machine Backup and Recovery

Lab : Implementing a Virtual Machine Backup Strategy with Data Protection Manager 2hrs

Module 22: Planning and Implementing an Public Key Infrastructure 3.5hrs

Planning and Implementing a Certification Authority Deployment

Planning and Implementing Certificate Templates

Planning and Implementing Certificate Distribution and Revocation

Planning and Implementing Key Archival and Recovery

Lab : Planning and Implementing an Active Directory Certificate Services (AD CS) Infrastructure 2hrs

Module 23: Planning and Implementing an Identity Federation Infrastructure 3.5hrs

Page 53: €¦ · 2 Table of Contents Introduction

53

Planning and Implementing an AD FS Server Infrastructure

Planning and Implementing AD FS Claim Providers and Relying Parties

Planning and Implementing AD FS Claims and Claim Rules

Lab : Planning and Implementing an Active Directory Federation Services (AD FS) Infrastructure 3hrs

Module 24: Planning and Implementing an Information Rights Management Infrastructure 3.5hrs

Planning and Implementing an AD RMS Cluster

Planning and Implementing AD RMS Templates and Policies

Planning and Implementing External Access to AD RMS Services

Planning and Implementing AD RMS Integration with Dynamic Access Control (DAC)

Lab : Planning and Implementing an AD RMS Infrastructure 3hrs

NH10750

Private Cloud: Monitoring and Operating a Private Cloud with System Center 2012

104 Total Hours

72 Theory Hours

32 Lab Hours

COURSE TITLE: Private Cloud: Monitoring and Operating a Private Cloud with System Center 2012 PREREQUISITE: Experience with Windows Server, Active Directory, Networking, SharePoint, SAN or

HyperV , or equivalent knowledge.

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Describe the private cloud infrastructure.

Configure and optimize business unit clouds.

Deploy cloud services.

Monitor private cloud services.

Configure application performance monitoring.

Operate and extend service management in the private cloud.

Automate incident creation, remediation, and change requests.

Implement problem management in the private cloud.

Automate Self-Service provisioning.

Protect the resources in the private cloud by using Data Protection Manager.

Configure compliance in the private cloud.

Configure SLAs, dashboards, and widgets.

COURSE OBJECTIVES: This course focuses on how to manage and administer the private cloud, and it describes

how you can monitor key infrastructure elements and applications that run within the private cloud. It does not

discuss planning and implementation.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2012): Monitoring and Operating a Private Cloud with System Center 2012 - Microsoft

Publishing

Microsoft Server 2012 Software INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

Page 54: €¦ · 2 Table of Contents Introduction

54

COURSE OUTLINE:

Module 1: Introduction to the Private Cloud 6hrs

Overview of the Cloud Computing Model

Requirements for the Private Cloud

Operating a Private Cloud Infrastructure with System Center

Maintaining the Health of the Private Cloud

Integrating System Center Components

Verifying the Compliance of the Private Cloud Infrastructure

Lab : Verifying the Private Cloud Infrastructure 2hrs

Lab : Verifying the Compliance of the Private Cloud Infrastructure 2.5hrs

Module 2: Configuring and Optimizing Business Unit Clouds 6hrs

Overview of System Center Virtual Machine Manager

Managing a Virtual Environment with Virtual Machine Manager

Creating Business Unit Clouds

Lab : Configuring and Optimizing Business Unit Clouds 2.5hrs

Module 3: Deploying Cloud Services 6hrs

Overview of Service Templates

VMM Profiles

Web Deploy Packages

Overview of Server App-V

Data-Tier Application Packages

Lab : Importing and Deploying the Stock Trader Application 2.5hrs

Module 4: Monitoring Private Cloud Services 6hrs

Overview of System Center Operations Manager

Agent Deployment in Operations Manager

Configuring Custom Monitoring

Monitoring the Network Infrastructure

Monitoring Distributed Applications

Lab : Monitoring Private Cloud Services 2.5hrs

Module 5: Configuring Application Performance Monitoring 6hrs

Application Performance Monitoring

Advanced Monitoring in Application Performance Monitoring

Viewing Application Performance in Operations Manager

Lab : Configuring Application Performance Monitoring 2.5hrs

Module 6: Operating and Extending Service Management in the Private Cloud 6hrs

Overview of Service Manager

Configuring Security and User Roles

Configuring Work Items

Configuring Incident Queues

Configuring Service Offerings

Lab : Operating and Extending Service Management in the Cloud 2.5hrs

Module 7: Automatic Incident Creation, Remediation, and Change Requests 6hrs

Page 55: €¦ · 2 Table of Contents Introduction

55

Overview of System Center Orchestrator 2012

Integrating Orchestrator with Operations Manager and Service Manager

Lab : Automating Incident Creation, Remediation, and Change Requests 2.5hrs

Module 8: Problem Management in the Private Cloud 6hrs

Overview of Problem Management

Creating Custom Rules

Lab : Automating Problem Management in the Private Cloud 2.5hrs

Module 9: Automating Self-Service Provisioning 6hrs

Installing and Configuring the System Center Cloud Services Process Pack

Cloud Services Configuration Items

Cloud Services Request Items

Lab : Automating Self-Service Provisioning 2.5hrs

Module 10: Private Cloud Protection and Recovery 6hrs

Protecting Data in the Private Cloud

Recovering Data in the Private Cloud

Lab : Private Cloud Protection and Recovery 2.5hrs

Module 11: Configuring Compliance in the Private Cloud 6hrs

Overview of the Process Pack for IT GRC

Installing and Configuring the Process Pack for IT GRC

Implementing an IT GRC Control Management Program

Maintaining Compliance through VMM Security Baselines and System Center Advisor

Lab : Configuring Compliance in the Private Cloud 2.5hrs

Module 12: Configuring SLAs, Dashboards, and Widgets 6hrs

Service Level Tracking

Configuring and Deploying Widgets and Dashboards

Publishing Real-Time State with Microsoft Visio Snap-in

System Center Analytics

Using Excel and SSRS to View Data

Overview of PerformancePoint

Lab : Configuring SLAs, Dashboards, and Widgets 2.5hrs

NH203-4142

Exchange Core and Advanced Solutions Exchange 2013

136 Total Hours

80 Theory Hours

56 Lab Hours

COURSE TITLE: Exchange Core and Advanced Solutions Exchange 2013 PREREQUISITE: Knowledge or experience including Windows Server 2008 R2 or Windows Server 2012,

and Active Directory and DNS.

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 136 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Page 56: €¦ · 2 Table of Contents Introduction

56

Plan and perform deployment and management of Microsoft Exchange Server 2013.

Plan a Mailbox server deployment and configure the Mailbox server role.

Create and manage various recipient objects in Exchange Server 2013.

Plan and deploy Client Access servers.

Plan and configure client connectivity to Exchange Server 2013 Client Access server.

Plan and configure message transport.

Plan and implement high availability.

Plan and implement disaster recovery for Exchange Server 2013.

Plan and configure message security options.

Plan and configure administrative security and administrative auditing.

Monitor and troubleshoot Exchange Server 2013.

Design and implement Exchange Server 2013 Unified Messaging.

Design and implement site resiliency for Exchange Server 2013.

Plan a virtualization strategy for Exchange Server 2013 roles.

Design and implement message transport security.

Design and implement message retention in Exchange Server 2013.

Design and implement messaging compliance.

Design and implement administrative security in an Exchange Server 2013 environment.

Use Windows PowerShell 3.0 to manage Exchange Server 2013.

Design and implement integration with Exchange Online.

Design and implement messaging coexistence.

Design and implement Exchange Server migrations from non-Exchange messaging systems, and

upgrades from previous Exchange Server versions.

COURSE OBJECTIVES: In this course, students will learn to configure and manage a Microsoft Exchange

Server 2013 messaging environment. This course will teach students guidelines, best practices, and considerations

that will help them optimize their Exchange server deployment. This will provide you with the knowledge and skills

to plan, install, and manage the mailbox role, client access, transport, and Exchange infrastructure.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2013): Core Solutions of Microsoft Exchange Server 2013 - Microsoft Publishing

Arvato Bertelsmann (2013): Advanced Solutions of Microsoft Exchange Server 2013 - Microsoft Publishing

Microsoft Server 2012 Software

Virtual PC

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Module 1: Deploying and Managing Exchange Server 2013 3.5hrs

Server 2013 Prerequisites and Requirements

Exchange Server 2013 Deployment

Managing Exchange Server 2013

Lab : Deploying and Managing Exchange Server 2013 2.5hrs

Module 2: Planning and Configuring Mailbox Servers 3.5hrs

Overview of the Mailbox Server Role

Planning the Mailbox Server Deployment

Page 57: €¦ · 2 Table of Contents Introduction

57

Configuring Mailbox Servers

Lab : Configuring Mailbox Servers 2.5hrs

Module 3: Managing Recipient Objects 3hrs

Managing Exchange Server 2013 Recipients

Managing Exchange Recipients

Managing Address Lists and Policies on Mailbox Server Role

Lab : Managing Exchange Recipient Objects 1hr

Module 4: Planning and Deploying Client Access Servers 3.5hrs

Planning Client Access Server Deployment

Configuring the Client Access Server Role

Managing Client Access Services

Lab : Deploying and Configuring Client Access Server Role 2.5hrs

Module 5: Planning and Configuring Messaging Client Connectivity 3.5hrs

Client Connectivity to Client Access Server

Configuring Outlook Web App

Planning and Configuring Mobile Messaging

Configuring Secure Internet Access for Client Access Server

Configuring Secure Internet Access for Client Access Server

Lab : Planning and Configuring Messaging Client Connectivity 2.5hrs

Module 6: Planning and Configuring Message Transport 3.5hrs

Overview of Message Transport

Planning and Configuring Message Transport

Managing Transport Rules

Lab : Planning and Configuring Message Transport 2.5hrs

Module 7: Planning and Implementing High Availability 3.5hrs

High Availability on Exchange Server 2013

Configuring Highly Available Mailbox Databases

Configuring Highly Available Client Access Servers

Lab : Implementing High Availability 2.5hrs

Module 8: Planning and Implementing Disaster Recovery 3.5hrs

Planning for Disaster Mitigation

Planning and Implementing Exchange Server 2013 Backup

Planning and Implementing Exchange Server 2013 Recovery

Lab : Implementing Disaster Recovery for Exchange Server 2013 2.5hrs

Module 9: Planning and Configuring Message Security Options 3.5hrs

Planning Messaging Security

Implementing an Antivirus Solution for Exchange Server 2013

Implementing an Antispam Solution for Exchange Server 2013

Lab : Planning and Configuring Message Security 2.5hrs

Module 10: Planning and Configuring Administrative Security and Auditing 3.5hrs

Configuring Role-Based Access Control

Page 58: €¦ · 2 Table of Contents Introduction

58

Configuring Audit Logging

Lab : Configuring Administrative Security and Auditing 2.5hrs

Module 11: Monitoring and Troubleshooting Exchange Server 2013 3.5hrs

Monitoring Exchange Server 2013

Maintaining Exchange Server 2013

Troubleshooting Exchange Server 2013

Lab : Monitoring and Troubleshooting Exchange Server 2013 2.5hrs

Module 12: Overview of Exchange Server 2013 Unified Messaging 3.5hrs

Telephony technologies overview

Unified Messaging in Exchange Server 2013

Unified Messaging components

Lab : Unified Messaging Overview 2.5hrs

Module 13: Designing and implementing Exchange Server 2013 Unified Messaging 3.5hrs

Designing a Unified Messaging deployment

Deploying and configuring Unified Messaging components

Integrating Exchange Server 2013 Unified Messaging with Lync

Lab : Designing and Implementing Exchange Server 2013 Unified Messaging 2.5hrs

Module 14: Designing and implementing site resiliency 3.5hrs

Site resiliency in Exchange Server 2013

Planning a site resilient implementation

Implementing site resiliency

Lab : Designing and implementing site resiliency 2.5hrs

Module 15: Planning virtualization for Exchange Server 2013 3.5hrs

Hyper-V 3.0 overview

Virtualizing Exchange Server 2013 server roles

Lab : Planning virtualization of Exchange Server roles 2.5hrs

Module 16: Designing and implementing message transport security 3.5hrs

Overview of policy and compliance requirements

Designing and implementing transport compliance

Designing and implementing AD RMS integration with Exchange Server 2013

Lab : Designing and implementing message transport security 2.5hrs

Module 17: Designing and implementing message retention 3.5hrs

Message records management and archiving overview

Designing in-place archiving

Designing and implementing message retention

Lab : Designing and implementing message retention 2.5hrs

Module 18: Designing and implementing messaging compliance 3.5hrs

Designing and implementing an in-place hold

Designing and implementing in-place e-discovery

Lab : Designing and implementing messaging compliance 2.5hrs

Module 19: Designing and implementing administrative security and auditing 3.5hrs

Page 59: €¦ · 2 Table of Contents Introduction

59

Designing and implementing role based access control

Designing and implementing split permissions

Planning and implementing audit logging

Lab : Designing and implementing administrative security and auditing 2.5hrs

Module 20: Managing Exchange Server 2013 with Exchange Management Shell 3.5hrs

Overview of Windows PowerShell 3.0

Using Exchange Management Shell to manage Exchange Server recipients

Managing Exchange Server 2013 with Exchange Management Shell

Lab : Managing Exchange Server 2013 with Exchange Management Shell 2.5hrs

Module 21: Designing and implementing integration with Exchange Online 3.5hrs

Planning for Exchange Online

Planning and implementing the migration to Exchange Online

Planning coexistence with Exchange Online

Lab : Designing integration with Exchange Online 2.5hrs

Module 22: Designing and implementing messaging coexistence 3.5hrs

Designing and implementing federation

Designing coexistence between Exchange organizations

Designing and implementing cross-forest mailbox moves

Lab : Implementing messaging coexistence 2.5hrs

Module 23: Designing and implementing Exchange Server migrations and upgrades 3.5hrs

Designing migration from non-Exchange email systems

Planning the upgrade from previous Exchange versions

Implementing the migration from previous Exchange versions

Lab : Designing and implementing Exchange Server migrations 2.5hrs

NH20336

Lync Server: Core Solutions of Microsoft Lync Server 2013

104 Total Hours

60 Theory Hours

44 Lab Hours

COURSE TITLE: Lync Server: Core Solutions of Microsoft Lync Server 2013 PREREQUISITE: Familiarity or experience with Windows 2008 R2 enterprise server or Windows Server

2012 environment.

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Describe the overall server and client Lync Server 2013 architecture.

Describe Lync 2013 features and user scenarios.

Describe the Lync Server deployment process.

Describe the components of a Lync Server 2013 Design.

Plan for Microsoft Solutions Framework for Lync 2013.

Plan Infrastructure Requirements for Lync Server 2013.

Page 60: €¦ · 2 Table of Contents Introduction

60

Use the Lync Server 2013 Planning Tool.

Use Topology Builder.

Plan for Site Topology.

Design a Site Topology.

Plan the Server Infrastructure.

Design Documentation Using Microsoft Office.

Use Lync Server 2013 management interfaces.

Configure Role-Based Access Control.

Prepare for client deployment.

Deploy and manage clients.

Prepare for device deployment.

Deploy and manage Internet Protocol (IP) phones.

Describe conferencing in Lync Server 2013.

Describe dial-in conferencing in Lync Server 2013.

Manage and administer dial-in conferencing in Lync Server 2013.

Describe the conferencing capabilities of Lync Server 2013.

Design audio and video for web conferencing.

Plan for instant message and presence Federation.

Design Edge services.

Describe the features and concepts for Persistent Chat in Lync Server 2013.

Design Lync Server 2013 to include Persistent Chat.

Deploy and configure Persistent chat in Lync Server 2013.

Describe the Archiving service.

Describe the Monitoring service.

Configure the Archiving and Monitoring services.

Describe and use the Lync Server 2013 troubleshooting tools.

Describe the required daily, weekly, and monthly maintenance tasks.

Describe the fundamental troubleshooting approach to Lync Server 2013 issues.

Use SIP commands and analyze SIP logs.

Describe high availability in Lync Server 2013.

Configure High Availability features in Lync Server 2013.

Plan for load balancing in Lync Server 2013.

Design load balancing in Lync Server 2013.

Describe the high availability options in Lync Server 2013.

Describe the tools for backing up and restoring Lync Server 2013 data.

Backup and restore critical Lync Server 2013 data.

Export and import critical Lync Server 2013 data.

Describe design considerations for branch site scenarios.

Describe the migration process.

Describe migration and coexistence topologies.

Plan for client and device migration.

Design a software deployment strategy for Lync 2013.

Page 61: €¦ · 2 Table of Contents Introduction

61

COURSE OBJECTIVES: This course teaches IT professionals how to plan, design, deploy, configure, and

administer a Microsoft Lync Server 2013 solution. The course emphasizes Lync Server 2013 Enterprise Unified

Communications features with particular emphasis on coexisting with and migrating from legacy communication

services. The labs in this course create a solution that includes IM and Presence, Conferencing, and Persistent Chat.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2013): Core Solutions of Microsoft® Lync® Server 2013 - Microsoft Publishing

Microsoft Server 2012 Software

Virtual PC

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Module 1: Architecture and Design Approach for Microsoft Lync Server 2013 5hrs

Overview of Lync Server 2013 Architecture

Overview of Lync Server 2013 Core Capabilities

Introduction to the Lync Server 2013 Design Process

Assessing Infrastructure Requirements and Updating the Design

Planning for all Microsoft Solutions Framework Phases

Module 2: Designing a Lync Server 2013 Topology 5hrs

Planning Infrastructure Requirements for Lync Server 2013

Using the Lync Server 2013 Planning Tool

Using Topology Builder

Planning the Server Infrastructure

Designing Documentation Using Microsoft Office

Lab : Preparing the Environment and Deploying a Lync Server 2013 Pool 4hrs

Module 3: Configuring Users and Rights in Microsoft Lync Server 2013 5hrs

Managing Lync Server 2013

Introduction to Role Based Access Control

Lab : Configuring Users and Rights in Lync Server 2013 4hrs

Module 4: Client and Device Deployment and Management 5hrs

Prepare for client deployment.

Deploy and manage clients.

Prepare for device deployment.

Deploy and manage IP phones.

Lab : Client and Device Management 4hrs

Module 5: Conferencing in Lync Server 2013 5hrs

Introduction to Conferencing in Lync Server 2013

Designing for Audio\Video and Web Conferencing

Dial-In Conferencing in Lync Server 2013

Managing and Administering Conferencing

Lab : Conferencing in Microsoft Lync Server 2013 4hrs

Module 6: Designing and Deploying External Access 5hrs

Conferencing and External Capabilities of Lync Server 2013

Planning for IM and Presence Federation

Page 62: €¦ · 2 Table of Contents Introduction

62

Designing Edge Services

Lab : Designing and Deploying for External Scenarios 4hrs

Module 7: Deploying Microsoft Lync Server 2013 Persistent Chat 5hrs

Overview of Persistent Chat Architecture in Lync Server 2013

Designing Lync Server 2013 Persistent Chat

Deploying and Configuring Lync Server 2013 Persistent Chat

Lab : Deploying Persistent Chat Server 4hrs

Module 8: Monitoring and Archiving 5hrs

The Archiving Service

The Monitoring Service

Configuring Archiving and Monitoring

Lab : Configuring and Using Archiving and Monitoring in Lync Server 2013 4hrs

Module 9: Administration and Maintenance of Lync Server 2013 5hrs

Introduction to Lync Server 2013 troubleshooting tools

Understanding Lync Server 2013 Operational Tasks

Developing Lync Server 2013 Troubleshooting Techniques

Lab : Administration and Maintenance of Lync Server 2013 4hrs

Module 10: High Availability in Lync Server 2013 5hrs

High Availability in Lync Server 2013

Configuring High Availability in Lync Server 2013

Planning for Load Balancing

Designing Load Balancing

Lab : Configuring High Availability in Lync Server 2013 4hrs

Module 11: Disaster Recovery in Lync Server 2013 5hrs

Disaster Recovery in Lync Server 2013

Tools for Backing Up and Restoring Lync Server 2013

Critical Lync Server 2013 Data to Back Up and Restore

Critical Lync Server 2013 Data to Export and Import

Designing Branch Site Resiliency

Lab : Configuring Disaster Recovery in Lync Server 2013 4hrs

Module 12: Planning a Migration to Lync Server 2013 5hrs

Overview of Coexistence and Migration

Migration Steps

Planning for Clients and Devices

Designing a Client Migration and Device Migration Strategy

Lab : Planning a Migration to Lync Server 2013 (Paper-based) 4hrs

NH20331

SharePoint: Core Solutions of Microsoft SharePoint Server 2013

104 Total Hours

56 Theory Hours

48 Lab hours

Page 63: €¦ · 2 Table of Contents Introduction

63

COURSE TITLE: SharePoint: Core Solutions of Microsoft SharePoint Server 2013 PREREQUISITE: Previous SharePoint experience, including knowledge of the differences between

SharePoint 2007 and 2010, or equivalent knowledge and skills.

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Describe the key features of SharePoint 2013

Design an information architecture

Design logical and physical architectures

Install and configure SharePoint Server 2013

Create web applications and site collections

Plan and configure service applications

Manage users and permissions

Configure authentication for SharePoint 2013

Secure a SharePoint 2013 deployment

Manage taxonomy

Configure user profiles

Configure enterprise search

Monitor and maintain a SharePoint 2013 environment

COURSE OBJECTIVES: This course will provide you with the knowledge and skills to configure and manage a

Microsoft SharePoint Server 2013 environment. This course will teach you how to configure SharePoint Server

2013, as well as provide guidelines, best practices, and considerations that will help you optimize your SharePoint

server deployment. Microsoft SharePoint Server 2013 is a document storage and collaboration platform that offers

many benefits to organizations. SharePoint deployments may take many different forms in scope, where a

deployment may be focused on only delivering one feature, such as enterprise search, or many features, such as

document management, business intelligence, web content management, and workflows. Deployments can also

differ greatly in size, with small deployments of a single server up to large deployments with farms of 15 or more

servers.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2013): Core Solutions of Microsoft® SharePoint® Server 2013 - Microsoft Publishing

Server 2012 Software

Virtual PC

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Module 1: Introducing SharePoint Server 2013 4hrs

Key Components of a SharePoint Deployment

New Features in SharePoint 2013

SharePoint 2013 Deployment Options

Module 2: Designing an Information Architecture 4hrs

Identifying Business Requirements

Understanding Business Requirements

Organizing Information in SharePoint 2013

Planning for Discoverability

Page 64: €¦ · 2 Table of Contents Introduction

64

Lab : Creating an Information Architecture - Part One 2hrs

Lab : Creating an Information Architecture - Part Two 2hrs

Module 3: Designing a Logical Architecture 4hrs

Overview of SharePoint 2013 Logical Architecture

Documenting Your Logical Architecture

Lab : Designing a Logical Architecture 2hrs

Module 4: Designing a Physical Architecture 4hrs

Designing Physical Components for SharePoint Deployments

Designing Supporting Components for SharePoint Deployments

SharePoint Farm Topologies

Mapping a Logical Architecture Design to a Physical Architecture Design

Lab : Designing a Physical Architecture 2hrs

Module 5: Installing and Configuring SharePoint Server 2013 4hrs

Installing SharePoint Server 2013

Scripting Installation and Configuration

Configuring SharePoint Server 2013 Farm Settings

Lab : Deploying and Configuring SharePoint Server 2013 - Part One 2hrs

Lab : Configuring SharePoint Server 2013 Farm Settings 2hrs

Module 6: Creating Web Applications and Site Collections 4hrs

Creating Web Applications

Configuring Web Applications

Creating and Configuring Site Collections

Lab : Creating and Configuring Web Applications 2hrs

Lab : Creating and Configuring Site Collections 2hrs

Module 7: Planning and Configuring Service Applications 4hrs

Introduction to Service Application Architecture

Creating and Configuring Service Applications Lab : Planning and Configuring Service Applications 2hrs

Module 8: Managing Users and Permissions 4hrs

Authorization in SharePoint 2013

Managing Access to Content Lab : Managing Users and Groups 2hrs

Lab : Securing Content in SharePoint Sites 2hrs

Module 9: Configuring Authentication for SharePoint 2013 4hrs

Overview of Authentication

Configuring Federated Authentication

Configuring Server-to-Server Authentication

Lab : Configuring SharePoint 2013 to Use Federated Identities 2hrs

Module 10: Securing a SharePoint 2013 Deployment 4hrs

Securing the Platform

Configuring Farm-Level Security

Lab : Hardening a SharePoint 2013 Server Farm 2hrs

Lab : Configuring Farm-Level Security 2hrs

Module 11: Managing Taxonomy 4hrs

Page 65: €¦ · 2 Table of Contents Introduction

65

Managing Content Types

Understanding Term Stores and Term Sets

Managing Term Stores and Term Sets

Lab : Configuring Content Type Propagation 2hrs

Lab : Configuring and Using Managed Metadata Term Sets 2hrs

Module 12: Configuring User Profiles 4hrs

Configuring the User Profile Service Application

Managing User Profiles and Audiences

Lab : Configuring User Profiles 4hrs

Lab : Configuring My Sites and Audiences 2hrs

Module 13: Configuring Enterprise Search 4hrs

Understanding the Search Service Architecture

Configuring Enterprise Search

Managing Enterprise Search

Lab : Configuring Enterprise Search 4hrs

Lab : Configuring the Search Experience 2hrs

Module 14: Monitoring and Maintaining a SharePoint 2013 Environment 4hrs

Monitoring a SharePoint 2013 Environment

Tuning and Optimizing a SharePoint Environment

Planning and Configuring Caching

Troubleshooting a SharePoint 2013 Environment

Lab : Monitoring a SharePoint 2013 Deployment 2hrs

Lab : Investigating Page Load Times 2hrs

NH107-7475

SQL: Querying and Administering SQL Server 2012

136 Total Hours

97 Theory Hours

39 Lab Hours

COURSE TITLE: SQL: Querying and Administering SQL Server 2012 PREREQUISITE: Before attending this course, students should have: A working knowledge of relational

databases and basic knowledge of the Microsoft Windows operating system and its core functionality.

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 136 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Write SELECT queries

Query multiple tables

Use built-in functions

Use subqueries

Execute stored procedures

Use set operators

Implement error handling

Implement transactions

Use table expressions

Page 66: €¦ · 2 Table of Contents Introduction

66

Sort and filter data

Use window ranking, offset and aggregate functions

Query SQL Server metadata

Program with T-SQL

Improve query performance

Plan and install SQL Server.

Describes the system databases, the physical structure of databases and the most common

configuration options related to them.

Explain the concept of the transaction log and SQL Server recovery models and implement

different backup strategies available with SQL Server.

Create SQL Server Backups.

Restore SQL Server databases.

Use the import/export wizards and explain how they relate to SSIS.

Work with SQL Server security models, logins and users.

Work with fixed server roles, user-defined server roles, fixed database roles and user-defined

database roles.

Work with permissions and the assignment of permissions.

Work with SQL Server Audit.

Work with SQL Server Agent, jobs and job history.

Implement SQL Server agent security, proxy accounts and credentials.

Configure database mail, alerts and notifications.

Create database maintenance plans.

Work with SQL Profiler and SQL Trace stored procedures.

Introduce DMVs and the configuration of data collection.

Work with Central Management Servers and Multi-Server queries, Virtualization of SQL Server

and Data-Tier Applications.

Troubleshoot SQL Server databases.

COURSE OBJECTIVES: This course provides students with the technical skills required to write basic Transact-

SQL queries for Microsoft SQL Server 2012. This course is the foundation for all SQL Server-related disciplines;

namely, Database Administration, Database Development and Business Intelligence. This course provides students

with the knowledge and skills to maintain a Microsoft SQL Server 2012 database. The course focuses on teaching

individuals how to use SQL Server 2012 product features and tools related to maintaining a database.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2012): Querying Microsoft® SQL Server® 2012 - Microsoft Publishing

Arvato Bertelsmann (2012): Administering Microsoft® SQL Server® 2012 Databases- Microsoft Publishing

Microsoft Server 2012 Software

Virtual PC

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Module 1: Introduction to Microsoft SQL Server 2012 2.5hrs

Introducing Microsoft SQL Server 2012

Getting Started with SQL Server Management Studio

Page 67: €¦ · 2 Table of Contents Introduction

67

Lab : Working with SQL Server 2012 Tools 1hr

Module 2: Getting Started with SQL Azure 2.5hrs

Overview of SQL Azure

Working with SQL Azure

Module 3: Introduction to T-SQL Querying 2.5hrs

Introducing T-SQL

Understanding Sets

Understanding Predicate Logic

Understanding the Logical Order of Operations in SELECT statements

Lab : Introduction to Transact-SQL Querying 1hr

Module 4: Writing SELECT Queries 2.5hrs

Writing Simple SELECT Statements

Eliminating Duplicates with DISTINCT

Using Column and Table Aliases

Writing Simple CASE Expressions

Lab : Writing Basic SELECT Statements 1hr

Module 5: Querying Multiple Tables 2.5hrs

Understanding Joins

Querying with Inner Joins

Querying with Outer Joins

Querying with Cross Joins and Self Joins

Lab : Querying Multiple Tables 1hr

Module 6: Sorting and Filtering Data 2.5hrs

Sorting Data

Filtering Data with a WHERE Clause

Filtering with the TOP and OFFSET-FETCH Options

Working with Unknown and Missing Values

Lab : Sorting and Filtering Data 1hr

Module 7: Working with SQL Server 2012 Data Types 2.5hrs

Introducing SQL Server 2012 Data Types

Working with Character Data

Working with Date and Time Data

Lab : Working with SQL Server 2012 Data Types 1hr

Module 8: Using Built-In Functions 2.5hrs

Using Conversion Functions

Using Logical Functions

Using Functions to Work with NULL

Lab : Using Built-In Functions 1hr

Module 9: Grouping and Aggregating Data 2.5hrs

Using Aggregate Functions

Using the GROUP BY Clause

Filtering Groups with HAVING

Page 68: €¦ · 2 Table of Contents Introduction

68

Lab : Grouping and Aggregating Data 1hr

Module 10: Using Subqueries 2.5hrs

Writing Self-Contained Subqueries

Writing Correlated Subqueries

Using the EXISTS Predicate with Subqueries

Lab : Using Subqueries 1hr

Module 11: Using Table Expressions 2.5hrs

Using Derived Tables

Using Common Table Expressions

Using Views

Using Inline Table-Valued Functions

Lab : Using Table Expressions 1hr

Module 12: Using Set Operators 2.5hrs

Writing Queries with the UNION Operator

Using EXCEPT and INTERSECT

Using APPLY

Lab : Using Set Operators 1hr

Module 13: Using Window Ranking, Offset and Aggregate Functions 2.5hrs

Creating Windows with OVER

Exploring Window Functions

Lab : Using Window Ranking, Offset and Aggregate Functions 1hrs

Module 14: Pivoting and Grouping Sets 2.5hrs

Writing Queries with PIVOT and UNPIVOT

Working with Grouping Sets

Lab : Pivoting and Grouping Sets 1hrs

Module 15: Querying SQL Server Metadata 2.5hrs

Querying System Catalog Views and Functions

Executing System Stored Procedures

Querying Dynamic Management Objects

Lab : Querying SQL Server Metadata 1hr

Module 16: Executing Stored Procedures 2.5hrs

Querying Data with Stored Procedures

Passing Parameters to Stored Procedures

Creating Simple Stored Procedures

Working with Dynamic SQL

Lab : Executing Stored Procedures 1hr

Module 17: Programming with T-SQL 2.5hrs

T-SQL Programming Elements

Controlling Program Flow

Lab : Programming with T-SQL 1hr

Module 18: Implementing Error Handling 2.5hrs

Using TRY / CATCH Blocks

Page 69: €¦ · 2 Table of Contents Introduction

69

Working with Error Information

Lab : Implementing Error Handling 1hr

Module 19: Implementing Transactions 2.5hrs

Transactions and the Database Engine

Controlling Transactions

Lab : Implementing Transactions 1hr

Module 20: Improving Query Performance 2.5hrs

Factors in Query Performance

Displaying Query Performance Data

Lab : Improving Query Performance 1hr

Module 21: Introduction to SQL Server 2012 and its Toolset 2.5hrs

Introduction to the SQL Server Platform

Working with SQL Server Tools

Configuring SQL Server Services

Lab : Introduction to SQL Server and its Toolset 1hrs

Module 22: Preparing Systems for SQL Server 2012 2.5hrs

Overview of SQL Server Architecture

Planning Server Resource Requirements

Pre-installation Testing for SQL Server

Lab : Preparing Systems for SQL Server 1hr

Module 23: Installing and Configuring SQL Server 2012 2.5hrs

Preparing to Install SQL Server

Installing SQL Server

Upgrading and Automating Installation

Lab : Installing and Configuring SQL Server 1hr

Module 24: Working with Databases 2.5hrs

Overview of SQL Server Databases

Working with Files and Filegroups

Moving Database Files

Lab : Working with Databases 1hr

Module 25: Understanding SQL Server 2012 Recovery Models 2.5hrs

Backup Strategies

Understanding SQL Server Transaction Logging

Planning a SQL Server Backup Strategy

Lab : Understanding SQL Server Recovery Models 1hr

Module 26: Backup of SQL Server 2012 Databases 2.5hrs

Backing up Databases and Transaction Logs

Managing Database Backups

Working with Backup Options

Lab : Backup of SQL Server Databases 1hr

Module 27: Restoring SQL Server 2012 Databases 2.5hrs

Page 70: €¦ · 2 Table of Contents Introduction

70

Understanding the Restore Process

Restoring Databases

Working with Point-in-time recovery

Restoring System Databases and Individual Files

Lab : Restoring SQL Server 2012 Databases 1hr

Module 28: Importing and Exporting Data 2.5hrs

Transferring Data To/From SQL Server

Importing and Exporting Table Data

Inserting Data in Bulk

Lab : Importing and Exporting Data 1hr

Module 29: Authenticating and Authorizing Users 2.5hrs

Authenticating Connections to SQL Server

Authorizing Logins to Access Databases

Authorization Across Servers

Lab : Authenticating and Authorizing Users 1hr

Module 30: Assigning Server and Database Roles 2.5hrs

Working with Server Roles

Working with Fixed Database Roles

Creating User-defined Database Roles

Lab : Assigning Server and Database Roles 1hr

Module 31: Authorizing Users to Access Resources 2.5hrs

Authorizing User Access to Objects

Authorizing Users to Execute Code

Configuring Permissions at the Schema Level

Lab : Authorizing Users to Access Resources 1hr

Module 32: Auditing SQL Server Environments 2.5hrs

Options for Auditing Data Access in SQL

Implementing SQL Server Audit

Managing SQL Server Audit

Lab : Auditing SQL Server Environments 1hr

Module 33: Automating SQL Server 2012 Management 2.5hrs

Automating SQL Server Management

Working with SQL Server Agent

Managing SQL Server Agent Jobs

Lab : Automating SQL Server Management 1hr

Module 34: Configuring Security for SQL Server Agent 2.5hrs

Understanding SQL Server Agent Security

Configuring Credentials

Configuring Proxy Accounts

Lab : Configuring Security for SQL Server Agent 1hr

Module 35: Monitoring SQL Server 2012 with Alerts and Notifications 2.5hrs

Page 71: €¦ · 2 Table of Contents Introduction

71

Configuration of Database Mail

Monitoring SQL Server Errors

Configuring Operators, Alerts and Notifications

Lab : Monitoring SQL Agent Jobs with Alerts and Notifications 1hr

Module 36: Performing Ongoing Database Maintenance 2.5hrs

Ensuring Database Integrity

Maintaining Indexes

Automating Routine Database Maintenance

Lab : Performing Ongoing Database Maintenance 1hr

Module 37: Tracing Access to SQL Server 2012 2.5hrs

Capturing Activity using SQL Server Profiler

Improving Performance with the Database Engine Tuning Advisor

Working with Tracing Options

Lab : Tracing Access to SQL Server 2012 1hr

Module 38: Monitoring SQL Server 2012 1hr

Monitoring Activity

Capturing and Managing Performance Data

Analyzing Collected Performance Data

Lab : Monitoring SQL Server 2012 1hr

Module 39: Managing Multiple Servers 2.5hrs

Working with Multiple Servers

Virtualizing SQL Server

Deploying and Upgrading Data-Tier Applications

Lab : Managing Multiple Servers 1hr

Module 40: Troubleshooting Common SQL Server 2012 Administrative Issues 1hr

SQL Server Troubleshooting Methodology

Resolving Service-related Issues

Resolving Concurrency Issues

Resolving Login and Connectivity Issues

Lab : Troubleshooting Common Issues 1hr

NH10777

SQL: Implementing a Data Warehouse with Microsoft

SQL Server 2012

104 Total Hours

58.5 Theory Hours

45.5 Lab Hours

COURSE TITLE: SQL: Implementing a Data Warehouse with Microsoft SQL Server 2012 PREREQUISITE: 2 years experience of working with relational databases, or equivalent knowledge

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Describe data warehouse concepts and architecture considerations.

Select an appropriate hardware platform for a data warehouse.

Page 72: €¦ · 2 Table of Contents Introduction

72

Design and implement a data warehouse.

Implement Data Flow in an SSIS Package.

Implement Control Flow in an SSIS Package.

Debug and Troubleshoot SSIS packages.

Implement an SSIS solution that supports incremental data warehouse loads and changing data.

Integrate cloud data into a data warehouse ecosystem infrastructure.

Implement data cleansing by using Microsoft Data Quality Services.

Implement Master Data Services to enforce data integrity.

Extend SSIS with custom scripts and components.

Deploy and Configure SSIS packages.

Describe how information workers can consume data from the data warehouse.

COURSE OBJECTIVES: Data warehousing is a solution organizations use to centralize business data for

reporting and analysis. This course focuses on teaching individuals how to create a data warehouse with SQL Server

2012, implement ETL with SQL Server Integration Services, and validate and cleanse data with SQL Server Data

Quality Services and SQL Server Master Data Services.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2012): Implementing a Data Warehouse with Microsoft® SQL Server® 2012 - Microsoft

Publishing

Microsoft Server 2012 Software

Virtual PC

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Module 1: Introduction to Data Warehousing 4.5hrs

Overview of Data Warehousing

Considerations for a Data Warehouse Solution

Lab : Exploring a Data Warehousing Solution 3hrs

Module 2: Data Warehouse Hardware 4.5hrs

Considerations for Building a Data Warehouse

Data Warehouse Reference Architectures and Appliances

Module 3: Designing and Implementing a Data Warehouse 4.5hrs

Logical Design for a Data Warehouse

Physical Design for a Data Warehouse

Lab : Implementing a Data Warehouse Schema 3.5hrs

Module 4: Creating an ETL Solution with SSIS 4.5hrs

Introduction to ETL with SSIS

Exploring Source Data

Implementing Data Flow

Lab : Implementing Data Flow in a SSIS Package 3hrs

Module 5: Implementing Control Flow in an SSIS Package 4.5hrs

Introduction to Control Flow

Creating Dynamic Packages

Using Containers

Page 73: €¦ · 2 Table of Contents Introduction

73

Managing Consistency

Lab : Implementing Control Flow in an SSIS Package 3hrs

Lab : Using Transactions and Checkpoints 3hrs

Module 6: Debugging and Troubleshooting SSIS Packages 4.5hrs

Debugging an SSIS Package

Logging SSIS Package Events

Handling Errors in an SSIS Package

Lab : Debugging and Troubleshooting an SSIS Package 3hrs

Module 7: Implementing an Incremental ETL Process 4.5hrs

Introduction to Incremental ETL

Extracting Modified Data

Loading Modified Data

Lab : Extracting Modified Data 3hrs

Lab : Loading Incremental Changes 3hrs

Module 8: Incorporating Data from the Cloud into a Data Warehouse 4.5hrs

Overview of Cloud Data Sources

SQL Server Database

The Windows Azure Marketplace

Lab : Using Cloud Data in a Data Warehouse Solution 3hrs

Module 9: Enforcing Data Quality 4.5hrs

Introduction to Data Quality

Using Data Quality Services to Cleanse Data

Using Data Quality Services to Match Data

Lab : Cleansing Data 3hrs

Lab : Deduplicating Data 3hrs

Module 10: Using Master Data Services 4.5hrs

Introduction to Master Data Services

Implementing a Master Data Services Model

Using the Master Data Services Add-in for Excel

Lab : Implementing Master Data Services 3hrs

Module 11: Extending SQL Server Integration Services 4.5hrs

Using Custom Components in SSIS

Using Scripts in SSIS

Lab : Using Custom Components and Scripts 3hrs

Module 12: Deploying and Configuring SSIS Packages 4.5hrs

Overview of SSIS Deployment

Deploying SSIS Projects

Planning SSIS Package Execution

Lab : Deploying and Configuring SSIS Packages 3hrs

Module 13: Consuming Data in a Data Warehouse 4.5hrs

Introduction to Business Intelligence

Introduction to Reporting

Page 74: €¦ · 2 Table of Contents Introduction

74

Introduction to Data Analysis

Lab : Using Business Intelligence Tools 3hrs

NH10776

SQL Data: Developing Microsoft SQL Server 2012 Databases

104 Total Hours

60 Theory Hours

44Lab Hours

COURSE TITLE: SQL Data: Developing Microsoft SQL Server 2012 Databases PREREQUISITE: Students who attend this training can meet the prerequisites by attending the following

courses, or obtaining equivalent knowledge and skills: NH107-7475.

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Introduce the entire SQL Server platform and its major tools. It will cover editions, versions,

basics of network listeners, and concepts of services and service accounts.

Determine appropriate data types to be used when designing tables, convert data between data

types, and create alias data types.

Be aware of good design practices regarding SQL Server tables and be able to create tables using

T-SQL. (Note: partitioned tables are not covered).

Implement PRIMARY KEY, FOREIGN KEY, DEFAULT, CHECK and UNIQUE constraints, and

investigate cascading FOREIGN KEY constraints.

Determine appropriate single column and composite indexes strategies.

Create tables as heaps and tables with clustered indexes. Also consider the design of a table and

suggest an appropriate structure.

Read and interpret details of common elements from execution plans.

Design effective non-clustered indexes.

Design and implement views

Design and implement stored procedures.

Work with table types, table valued parameters and use the MERGE statement to create stored

procedures that update data warehouses.

Design and implement functions, both scalar and table-valued. (Also describe where they can

lead to performance issues).

Perform basic investigation of a deadlock situation and learn how transaction isolation levels

affect application concurrency.

Use both traditional T-SQL error handling code and structured exception handling.

Design and implement DML triggers

Learn appropriate uses for SQL CLR integration and implement an existing .NET assembly within

SQL Server.

Store XML data and schemas in SQL Server.

Perform basic queries on XML data in SQL Server.

Work with the GEOGRAPHY and GEOMETRY data types

Implement and query a full-text index.

Page 75: €¦ · 2 Table of Contents Introduction

75

COURSE OBJECTIVES: This course introduces SQL Server 2012 and describes logical table design, indexing

and query plans. It also focusses on the creation of database objects including views, stored procedures, along with

parameters, and functions. Other common aspects of procedure coding, such as transactions, concurrency, error

handling, triggers, and SQL CLR are also covered in this course.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2012): Developing Microsoft® SQL Server® 2012 Databases - Microsoft Publishing

Microsoft Server 2012 Software

Virtual PC

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Module 1: Introduction to SQL Server 2012 and its Toolset 3hrs

Introduction to the SQL Server Platform

Working with SQL Server Tools

Configuring SQL Server Services

Lab : Introduction to SQL Server and its Toolset 2hrs

Module 2: Working with Data Types 3hrs

Using Data Types

Working with Character Data

Converting Data Types

Specialized Data Types

Lab : Working with Data Types 2hrs

Module 3: Designing and Implementing Tables 3hrs

Designing Tables

Working with Schemas

Creating and Altering Tables

Lab : Designing and Implementing Tables 4hrs

Module 4: Ensuring Data Integrity through Constraints 3hrs

Enforcing Data Integrity

Implementing Domain Integrity

Implementing Entity and Referential Integrity

Lab : Ensuring Data Integrity through Constraints 4hrs

Module 5: Planning for SQL Server 2012 Indexing 3hrs

Core Indexing Concepts

Data Types and Indexes

Single Column and Composite Indexes

Lab : Planning for SQL Server Indexing 2hrs

Module 6: Implementing Table Structures in SQL Server 2012 3hrs

SQL Server Table Structures

Working with Clustered Indexes

Designing Effective Clustered Indexes

Lab : Implementing Table Structures in SQL Server 2hrs

Module 7: Reading SQL Server 2012 Execution Plans 3hrs

Page 76: €¦ · 2 Table of Contents Introduction

76

Execution Plan Core Concepts

Common Execution Plan Elements

Working with Execution Plans

Lab : Reading SQL Server Execution Plans 2hrs

Module 8: Improving Performance through Nonclustered Indexes 3hrs

Designing Effective Nonclustered Indexes

Implementing Nonclustered Indexes

Using the Database Engine Tuning Advisor

Lab : Improving Performance through Nonclustered Indexes 2hrs

Module 9: Designing and Implementing Views 3hrs

Introduction to Views

Creating and Managing Views

Performance Considerations for Views

Lab : Designing and Implementing Views 2hrs

Module 10: Designing and Implementing Stored Procedures 3hrs

Introduction to Stored Procedures

Working With Stored Procedures

Implementing Parameterized Stored Procedures

Controlling Execution Context

Lab : Designing and Implementing Stored Procedures 2hrs

Module 11: Merging Data and Passing Tables 3hrs

Using the MERGE Statement

Implementing Table Types

Using TABLE Types As Parameters

Lab : Passing Tables and Merging Data 2hrs

Module 12: Designing and Implementing User-Defined Functions 3hrs

Overview of Functions

Designing and Implementing Scalar Functions

Designing and Implementing Table-Valued Functions

Implementation Considerations for Functions

Alternatives to Functions

Lab : Designing and Implementing User-Defined Functions 2hrs

Module 13: Creating Highly Concurrent SQL Server 2012 Applications 3hrs

Introduction to Transactions

Introduction to Locks

Management of Locking

Transaction Isolation Levels

Lab : Creating Highly Concurrent SQL Server Applications 2hrs

Module 14: Handling Errors in T-SQL Code 3hrs

Understanding T-SQL Error Handling

Implementing T-SQL Error Handling

Implementing Structured Exception Handling

Page 77: €¦ · 2 Table of Contents Introduction

77

Lab : Handling Errors in T-SQL Code 2hrs

Module 15: Responding to Data Manipulation via Triggers 3hrs

Designing DML Triggers

Implementing DML Triggers

Advanced Trigger Concepts

Lab : Responding to Data Manipulation via Triggers 2hrs

Module 16: Implementing Managed Code in SQL Server 2012 3hrs

Introduction to SQL CLR Integration

Importing and Configuring Assemblies

Implementing SQL CLR Integration

Lab : Designing and Implementing Views 2hrs

Module 17: Storing XML Data in SQL Server 2012 3hrs

Introduction to XML and XML Schemas

Storing XML Data and Schemas in SQL Server

Implementing the XML Data Type

Lab : Storing XML Data in SQL Server 2hrs

Module 18: Querying XML Data in SQL Server 3hrs

Using the T-SQL FOR XML Statement

Getting Started with XQuery

Shredding XML

Lab : Querying XML Data in SQL Server 2hrs

Module 19: Working with SQL Server 2012 Spatial Data 3hrs

Introduction to Spatial Data

Working with SQL Server Spatial Data Types

Using Spatial Data in Applications

Lab : Working with SQL Server Spatial Data 2hrs

Module 20: Working with Full-Text Indexes and Queries 3hrs

Introduction to Full-Text Indexing

Implementing Full-Text Indexes in SQL Server

Working with Full-Text Queries

Lab : Working with Full-Text Indexes and Queries 2hrs

NH20465

SQL Data: Designing Database Solutions for Microsoft SQL Server 2012

104 Total Hours

65 Theory Hours

39 Lab Hours

COURSE TITLE: SQL Data: Designing Database Solutions for Microsoft SQL Server 2012 PREREQUISITE: Familiarity with SQL Server 2012, or equivalent knowledge and skills.

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Page 78: €¦ · 2 Table of Contents Introduction

78

Design an appropriate database server infrastructure for a given business application scenario

Design a logical schema for a database based on application requirements

Design the physical implementation of a database for a given set of requirements

Evaluate options for including binary large object data in a database design

Plan and manage indexes to optimize performance

Describe the key considerations for designing security for SQL Server instances and databases

Plan policy-based management to manage server instances, databases, and other SQL Server

2012 objects more efficiently

Plan SQL Server health monitoring

Implement SQL Server health monitoring by using SQL Server Utility

Identify and implement the appropriate backup strategy for a given scenario

Plan and manage multi-server maintenance and automation

Understand the benefits of using PowerShell to manage SQL Server 2012

Design an optimal replication strategy from a given set of business and technical requirements

Plan and implement a high availability solution

COURSE OBJECTIVES: This course describes how to design and monitor high performance, highly available

data solutions with SQL Server 2012. This course focuses on creating plans and designs for database structure,

storage, objects, and servers. Students will have the opportunity to practices hands-on skills and design tasks in a

virtual lab environment and will learn about topics such as data compression, high availability, data migration,

security, and scalability.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2012): Designing Database Solutions for Microsoft® SQL Server® 2012 - Microsoft

Publishing

Microsoft Server 2012 Software

Virtual PC INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Module 1: Designing a Database Server Infrastructure 5hrs

Planning a Database Server Infrastructure

Planning Server Hardware

Considerations for Database Server Consolidation

Managing Server Resources in a Consolidated Database Infrastructure

Lab : Planning Database Server Consolidation 3hrs

Module 2: Designing a Logical Database Schema 5hrs

Relational Database Design Techniques

Planning Schemas and Tables

Lab : Designing a Logical Database Schema 3hrs

Module 3: Designing a Physical Database Implementation 5hrs

Planning Files and Filegroups

Planning a Partitioning Data

Planning Compression

Lab : Designing a Physical Database Implementation 3hrs

Module 4: Incorporating Data Files into Databases 5hrs

Page 79: €¦ · 2 Table of Contents Introduction

79

Considerations for Working with Data Files in SQL Server 2012

Implementing FileStream and FileTables

Searching Data Files

Lab : Implementing a Solution for Storing Data Files 3hrs

Module 5: Tuning Database Performance 5hrs

Optimizing Query Performance by Using Indexes

Working with Query Plans

Performance Monitoring

Lab : Using Indexes and Plan Guides 3hrs

Module 6: Designing Database Security 5hrs

Introduction to Security Planning

Planning Security

Contained Databases

Protecting Data with Encryption

Lab : Planning and Implementing Security 3hrs

Module 7: Policy Based Management 5hrs

Introduction to Policy-Based Management

Planning and Implementing Policy-Based Management

Lab : Planning Policy-Based Management 3hrs

Module 8: Monitoring Server Health 5hrs

Introduction to Server Health Monitoring

SQL Server Utility

Lab : Monitoring Server Health 3hrs

Module 9: Designing a Database Backup Solution 5hrs

SQL Server Backup and Restore

Planning a Recovery Strategy

Lab : Planning and Implementing a Backup Strategy 3hrs

Module 10: Automating Multi-Server Maintenance 5hrs

Overview of Maintenance Automation

Managing Multiple Servers

Lab : Automating Multi-Server Maintenance 3hrs

Module 11: Managing SQL Server with PowerShell 5hrs

Introduction to Windows PowerShell

Scripting with Windows PowerShell

Lab : Managing SQL Server with Windows PowerShell 3hrs

Module 12: Replicating Data 5hrs

SQL Server Replication

Planning Replication

Lab : Planning and Implementing SQL Server Replication 3hrs

Module 13: Planning High Availability 5hrs

High Availability in SQL Server 2012

Page 80: €¦ · 2 Table of Contents Introduction

80

AlwaysOn Availability Groups

Lab : Implementing High Availability 3hrs

H10778

SQL BI: Implementing Data Models and Reports with Microsoft SQL Server 2012

104 Total Hours

70 Theory Hours

34 Lab Hours

COURSE TITLE: SQL BI: Implementing Data Models and Reports with Microsoft SQL Server 2012 PREREQUISITE: 2 years’ experience of working with relational databases, or equivalent knowledge or

training

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Describe the components, architecture, and nature of a BI solution.

Create reports with Reporting Services.

Create reusable report items that simplify self-service reporting.

Manage report execution and delivery.

Create a multidimensional database with Analysis Services.

Implement dimensions in a cube.

Implement measures and measure groups in a cube.

Use MDX Syntax.

Customize a cube.

Implement a Tabular Data Model in PowerPivot.

Use DAX to query a tabular model.

Implement a Tabular Database.

Use PowerView to create interactive data visualizations.

Use Data Mining for Predictive Analysis.

COURSE OBJECTIVES: Business intelligence (BI) is becoming increasingly important for companies of many

different sizes and types because of the competitive edge it can help to give them. The combined capabilities of

Microsoft SQL Server 2012 and Microsoft SharePoint 2010 make it easier than ever for companies to develop a BI

solution that meets their specific needs, provides reduced total cost of ownership (TCO), and achieves a faster time

to solution. This course teaches students how to empower information workers through self-service analytics and

reporting. Students will learn how to implement multidimensional analysis solutions, create PowerPivot and tabular

data models, deliver rich data visualizations with PowerView and SQL Server Reporting Services, and discover

business insights by using data mining.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2012): Implementing Data Models and Reports with Microsoft® SQL Server® 2012 -

Microsoft Publishing

Microsoft Server 2012 Software

Virtual PC

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Module 1: Introduction to Business Intelligence and Data Modeling 5hrs

Page 81: €¦ · 2 Table of Contents Introduction

81

Introduction to Business Intelligence

The Microsoft Business Intelligence Platform

Lab : Reporting and Analyzing Data 4hrs

Module 2: Implementing Reports with SQL Server Reporting Services 5hrs

Introduction to Reporting Services

Creating a Report with Report Designer

Grouping and Aggregating Data in a Report

Showing Data Graphically

Filtering Reports by Using Parameters

Publishing and Viewing a Report

Lab : Creating a Report with Report Designer 4hrs

Lab : Enhancing and Publishing a Report 2hrs

Module 3: Supporting Self Service Reporting 5hrs

Introduction to Self Service Reporting

Shared Data Sources and Datasets

Report Parts

Lab : Implementing Self Service Reporting 2hrs

Module 4: Managing Report Execution and Delivery 5hrs

Managing Report Security

Managing Report Execution

Subscriptions and Data Alert

Troubleshooting Reporting Services

Lab : Configuring Report Execution and Delivery 2hrs

Module 5: Creating Multidimensional Databases 5hrs

Introduction to Multidimensional Analysis

Creating Data Sources and Data Source Views

Creating a Cube

Overview of Cube Security

Lab : Creating a Multidimensional Database 2hrs

Module 6: Working with Dimensions 5hrs

Configuring Dimensions

Defining Attribute Hierarchies

Sorting and Grouping Attributes

Lab : Defining Dimensions 2hrs

Module 7: Working with Measures and Measure Groups 5hrs

Working with Measures

Working with Measure Groups

Lab : Configuring Measures and Measure Groups 2hrs

Module 8: Introduction to MDX 5hrs

MDX Fundamentals

Adding Calculations to a Cube

Using MDX to Query a Cube

Page 82: €¦ · 2 Table of Contents Introduction

82

Lab : Using MDX 2hrs

Module 9: Customizing Cube Functionality 5hrs

Working with Key Performance Indicators

Working with Actions

Working with Perspectives

Working with Translations

Lab : Customizing a Cube 2hrs

Module 10: Implementing a Tabular Data Model with Microsoft PowerPivot 5hrs

Introduction to Tabular Data Models and PowerPivot Technologies

Creating a Tabular Data Model by Using PowerPivot for Excel

Sharing a PowerPivot Workbook and Using PowerPivot Gallery

Lab : Using PowerPivot for Excel 2hrs

Module 11: Introduction to DAX 5hrs

DAX Fundamentals

Using DAX to Create Calculated Column and Measures in a Tabular Data Model

Lab : Creating Calculated Columns and Measures by Using DAX 2hrs

Module 12: Implementing an Analysis Services Tabular Data Model 5hrs

Introduction to Analysis Services Tabular Data Model Projects

Developing an Analysis Services Tabular Data Model in SQL Server Data Tools

Lab : Working with an Analysis Services Tabular Data Model 2hrs

Module 13: Creating Data Visualizations with Power View 5hrs

Introduction to Power View

Visualizing Data with Power View

Lab : Creating Data Visualizations with Power View 2hrs

Module 14: Performing Predictive Analysis with Data Mining 5hrs

Overview of Data Mining

Creating a Data Mining Solution

Validating a Data Mining Solution

Consuming a Data Mining Solution

Lab : Using Data Mining to Support a Marketing Campaign 2hrs

NH20467

SQL BI: Designing Business Intelligence Solutions with Microsoft SQL Server 2012

104 Total Hours

59 Theory Hours

45 Lab Hours

COURSE TITLE: SQL BI: Designing Business Intelligence Solutions with Microsoft SQL Server 2012 PREREQUISITE: Students who attend this training can meet the prerequisites by attending the following

courses, or by obtaining equivalent knowledge and skills: NH10777, NH10778

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Page 83: €¦ · 2 Table of Contents Introduction

83

Plan the components of a BI solution.

Plan a BI infrastructure.

Design a data warehouse.

Design an ETL solution.

Plan analytical data models.

Plan a BI delivery solution.

Design a Reporting Services solution.

Design an Excel reporting solution.

Plan a SharePoint Server BI solution.

Monitor and optimize a BI solution.

Plan for BI operations.

COURSE OBJECTIVES: This course teaches students how to design and implement a BI infrastructure. The

course discusses design, installation. The course discusses design, installation, and maintenance of a BI platform.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2012): Designing Business Intelligence Solutions with Microsoft® SQL Server® 2012 -

Microsoft Publishing

Microsoft Server 2012 Software

Virtual PC

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Module 1: Planning a BI Solution 4hrs

Elements of a BI Solution

The Microsoft BI Platform

Planning a BI Project

Lab : Planning a BI Solution 3hrs

Module 2: Planning SQL Server Business Intelligence Infrastructure 5.5hrs

Considerations for BI Infrastructure

Planning Data Warehouse Hardware

Lab : Planning a BI Infrastructure 3hrs

Module 3: Designing a Data Warehouse 5.5hrs

Data Warehouse Design Overview

Designing Dimension Tables

Designing Fact Tables

Designing a Data Warehouse Physical Implementation

Lab : Designing a Data Warehouse Logical Schema 3hrs

Lab : Designing a Data Warehouse Physical Implementation 3hrs

Module 4: Designing an ETL Solution 5.5hrs

ETL Overview

Planning Data Extraction

Planning Data Transformation

Planning Data Loads

Page 84: €¦ · 2 Table of Contents Introduction

84

Lab : Designing an ETL Solution 3hrs

Module 5: Designing Analytical Data Models 5.5hrs

Introduction to Analytical Data Models

Designing an Analytical Data Model

Designing Dimensions

Enhancing Data Models

Lab : Comparing Analytical Data Models 3hrs

Lab : Designing Dimensions and Hierarchies 3hrs

Lab : Enhancing Analytical Data Models 3hrs

Module 6: Planning a BI Delivery Solution 5.5hrs

Considerations for Delivering BI

Common Reporting Scenarios

Choosing a Reporting Tool

Lab : Planning a BI Delivery Solution 3hrs

Module 7: Designing a Reporting Services Solution 5.5hrs

Planning a Reporting Services Solution

Designing Reports

Planning Report Consistency

Lab : Designing a Reporting Services Solution 3hrs

Module 8: Designing a Microsoft Excel-Based Reporting Solution 5.5hrs

Using Excel for Data Analysis and Reporting

PowerPivot for Excel

Power View for Excel

Lab : Designing an Excel Reporting Solution 3hrs

Module 9: Planning a SharePoint Server BI Solution 5.5hrs

Introduction to SharePoint Server as a BI Platform

Planning Security for a SharePoint Server BI Solution

Planning Reporting Services Configuration

Planning PowerPivot Configuration

Planning for PerformancePoint Services

Lab : Implementing a SharePoint Server BI Solution 3hrs

Lab : Implementing a PerformancePoint Services 3hrs

Module 10: Monitoring and Optimizing a BI Solution 5.5hrs

Overview of BI Monitoring

Monitoring and Optimizing the Data Warehouse

Monitoring and Optimizing Analysis Services

Monitoring and Optimizing Reporting Services

Lab : Monitoring and Optimizing a BI Solution 3hrs

Module 11: Operating a BI Solution 5.5hrs

Overview of BI Operations

ETL Operations

Data Warehouse Operations

Analysis Services Operations

Page 85: €¦ · 2 Table of Contents Introduction

85

Reporting Services Operations

Lab : Operating a BI Solution 3hrs

NH20417

Upgrading Server 2008 to MCSA Windows Server 2012

104 Total Hours

60 Theory Hours

44 Lab Hours

COURSE TITLE: Upgrading Server 2008 to MCSA Windows Server 2012 PREREQUISITE: Previous experience or knowledge of Windows Server 2008

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Install and configure Windows Server 2012.

Monitor and maintain Windows Server 2012.

Manage Windows Server with Windows PowerShell 3.0.

Manage storage for Windows Server 2012 servers.

Implement network services.

Implement Remote Access.

Implement Failover Clustering.

Implement Hyper-V.

Implement Failover Clustering with Hyper-V.

Implement Dynamic Access Control.

Implement Active Directory Domain Services (AD DS).

Plan and implement AD FS.

COURSE OBJECTIVES: This course is designed primarily for people who want to upgrade their technical skills

from Windows Server 2008 and Windows Server 2008 R2 to Windows Server 2012. This course explains new

features and functionality in Windows Server 2012 around management, networking infrastructure, storage, access

control, Hyper-V, high availability, and identity federation. Specific technologies covered will include Dynamic

Access Control (DAC), Failover Clustering, Microsoft Online Backup and changes with Active Directory, and

Hyper-V and Active Directory Federation Services (ADFS).

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2012): Upgrading Your Skills to MCSA Windows Server® 2012 – Microsoft Publishing

Microsoft Server 2012 Software

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Module 1: Installing and Configuring Windows Server 2012 5hrs

Installing Windows Server 2012

Configuring Windows Server 2012

Configuring Remote Management for Windows Server 2012 Servers

Lab : Installing and Configuring Windows Server 2012 Servers 2hrs

Module 2: Monitoring and Maintaining Windows Server 2012 5hrs

Monitoring Windows Server 2012

Page 86: €¦ · 2 Table of Contents Introduction

86

Implementing Windows Server Backup

Implementing Server and Data Recovery

Lab : Monitoring and Maintaining Windows 2012 Servers 3.5hrs

Module 3: Managing Windows Server 2012 by Using Windows PowerShell 3.0 5hrs

Overview of Windows PowerShell 3.0

Using Windows PowerShell 3.0 to Manage AD DS

Managing Servers by Using Windows PowerShell 3.0

Lab : Managing Servers Running Windows Server 2012 by Using Windows PowerShell 3.0 3.5hrs

Module 4: Managing Storage for Windows Server 2012 5hrs

New Features in Windows Server 2012 Storage

Configuring iSCSI Storage

Configuring Storage Spaces in Windows Server 2012

Configuring BranchCache in Windows Server 2012

Lab : Managing Storage for Servers Based on Windows Server 2012 3.5hrs

Lab : Implementing BranchCache 3.5hrs

Module 5: Implementing Network Services 5hrs

Implementing DNS and DHCP Enhancements

Implementing IP Address Management

NAP Overview

Implementing NAP

Lab : Implementing Network Services 3.5hrs

Module 6: Implementing Remote Access 5hrs

Overview of VPN Access

Overview of DirectAccess

Installing and Configuring DirectAccess Components

Lab : Implementing DirectAccess 3.5hrs

Module 7: Implementing Failover Clustering 5hrs

Overview of Failover Clustering

Implementing a Failover Cluster

Configuring Highly-Available Applications and Services on a Failover Cluster

Maintaining a Failover Cluster

Implementing a Multisite Failover Cluster

Lab : Implementing Failover Clustering 3.5hrs

Module 8: Implementing Hyper-V 5hrs

Configuring Hyper-V Servers

Configuring Hyper-V Storage

Configuring Hyper-V Networking

Configuring Hyper-V Virtual Machines

Lab : Implementing Server Virtualization with Hyper-V 3.5hrs

Module 9: Implementing Failover Clustering with Hyper-V 5hrs

Overview of the Integration of Hyper-V Server 2012 with Failover Clustering

Implementing Hyper-V Virtual Machines on Failover Clusters

Page 87: €¦ · 2 Table of Contents Introduction

87

Implementing Windows Server 2012 Hyper-V Virtual Machine Movement

Managing Hyper-V Virtual Environments by Using Virtual Machine Manager

Lab : Implementing Failover Clustering with Hyper-V 3.5hrs

Module 10: Implementing Dynamic Access Control 5hrs

Overview of Dynamic Access Control

Planning for a Dynamic Access Control Implementation

Implementing and Configuring Dynamic Access Control

Lab : Implementing Dynamic Access Control 3.5hrs

Module 11: Implementing Active Directory Domain Services 5hrs

Deploying AD DS Domain Controllers

Configuring AD DS Domain Controllers

Implementing Service Accounts

Implementing Group Policy in AD DS

Maintaining AD DS

Lab : Implementing AD DS 3.5hrs

Module 12: Implementing Active Directory Federation Services 5hrs

Overview of AD FS

Deploying AD FS

Implementing AD FS for a Single Organization

Deploying AD FS in a B2B Federation Scenario

Lab : Implementing AD FS 3.5hrs

NH5000 A+ Comprehensive 120 Total Hours

75 Theory Hours

45 Lab Hours

COURSE TITLE: A+ Comprehensive PREREQUISITE: N/A

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 120 hours

COURSE OVERVIEW: After completing this course, students will be able to perform tasks such as:

Installation

Configuration

Diagnosing

Preventative Maintenance

Basic Networking

COURSE OBJECTIVES: CompTIA A+ Comprehensive is the starting point for a career in IT. The course covers

maintenance of PCs, mobile devices, laptops, operating systems and printers.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

LogicalCHOICE CompTIA A+ Certification: A Comprehensive Approach (Exams 220-801 and 220-802)

Print/Electronic Student Kit Training Bundle - Blended Kit – Logical Operations

1-2 “A+ machines”

Printer

Page 88: €¦ · 2 Table of Contents Introduction

88

Microsoft Operating System

Power Supply

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Course Introduction .5 hrs

Lesson 01 - Hardware Fundamentals 4.5hrs

Topic A: Computer System Components

Common Computer Components

Live Demo - Outside of the Computer

Live Demo - Inside of the Computer

The Motherboard

The CPU

Memory

The System Bus

Live Demo - Bus Slots

Topic B: Storage Devices

Storage Devices

Power Supplies

Cooling Systems

Expansion Cards

Riser Cards

Live Demo - Riser Card

Firmware

The System BIOS

The POST

Floppy Drives

Hard Drives

Types of Hard Drives

Live Demo - Drive Identification

Optical Disks

Optical Drives

Live Demo - Optical Drive Connections

Tape Drives

Solid State Storage

Types of Solid State Storage

Topic C: Device Connections and Interfaces

Ports

Computer Connections

Serial Connections

Live Demo - Serial Connectors

Parallel Connections

Page 89: €¦ · 2 Table of Contents Introduction

89

USB Connections

Live Demo - USB Connectors

IEEE 1394 and FireWire Connections

Live Demo - FireWire Cable

SCSI Connections

PATA Connections

SATA Connections

Live Demo - SATA Cable

Display Cable and Connector Types

Audio/Video Connections

Comparing Analog and Digital Video

Live Demo - Identifying Video Adapter Types

Wireless Device Connections

Lesson 01 Review

Lesson 02 - Operating System Fundamentals 5hrs

Topic A: Personal Computer Operating Systems

Microsoft Windows

Microsoft Windows Features

Microsoft Windows 7 Versions

Microsoft Windows Vista Versions

Microsoft Windows XP Versions

Other Operating Systems

Topic B: Windows Control Panel Utilities

The Control Panel

Internet Options

Display

User Accounts

Folder Options

System

Action Center

Windows Firewall

Power Options

Windows XP Control Panel Utilities

Windows Vista Control Panel Utilities

Windows 7 Control Panel Utilities

Demo - Exploring the Windows 7 Control Panel

Topic C: Command Line Tools

The Command Prompt

Operating System Command Line Tools

Networking Command Line Tools

The Recovery Console

WinRE

Page 90: €¦ · 2 Table of Contents Introduction

90

Topic D: Windows Operating System Tools

Types of User Accounts

User Account Control

Group Accounts

System Files and Folders

Windows Explorer

Computer/My Computer

File Extensions

Demo - Viewing File Extensions

File Attributes

Windows File System Types

Permissions

NTFS File Permissions

NTFS Folder Permissions

Demo - Exploring NTFS Permissions

Shared Files and Folders

Share Permissions

NTFS vs. Share Permissions

Permissions Considerations

User Authentication

Topic E: Windows Operating System Tools

Administrative Tools

Demo - Exploring Administrative Tools

Local Users and Groups

Device Manager

Demo - Using Computer Management and Device Manager

Task Manager

Demo - Using Task Manager

Disk Management

Migration Tools

The Registry

Registry Subtrees

Run Line Utilities

MSConfig

Demo - Exploring System Configuration Settings and Information

Lesson 02 Review

Lab: Operating System Fundamentals 4.5hrs

Lab: Configuring Windows Operating System Components 4.5hrs

Lesson 03 - PC Technician Professional Best Practices 5hrs

Topic A: Basic Maintenance Tools and Techniques

Types of Hardware Toolkits

Live Demo - Identifying Common Toolkit Components

Page 91: €¦ · 2 Table of Contents Introduction

91

Software Diagnostic Tools

Hard Drive Self-Tests

Software Diagnostic Tests

Computer Component Maintenance Techniques

Cleaning Compounds and Materials

Live Demo – Maintenance

Documentation and Resources

Compliance and Government Regulations

Topic B: Electrical Safety

Static Electricity

ESD

ESD Prevention Techniques

Live Demo – ESD

EMI

EMI Prevention Techniques

An ESD Toolkit

Electrical Hazards

Electrical Safety Precautions

Topic C: Environmental Safety and Materials Handling

Environmental Considerations and Controls

Workplace Safety Issues

Environmental Safety Best Practices

General Power Issues

Power Protection Systems

Liquid Hazards

Chemical Hazards

MSDS Documents

Incident Reports

Hazardous Material Disposal Procedures

Topic D: Professionalism and Communication

Communication Skills

AUP

Professional Conduct

Prohibited Content

Best Practices Related to Prohibited Content or Activity

Computer Forensics

Lesson 03 Review

Lesson 04 - Peripheral Components 5hrs

Topic A: Install and Configure Display Devices

Display Device Types

Display Device Settings and Features

Device Drivers

Page 92: €¦ · 2 Table of Contents Introduction

92

Display Device Selection Tips

Display Device Installation Considerations

Demo - Configuring Display Devices

Topic B: Install and Configure Input Devices

Standard Input Device Types

Biometric Input Device Types

Specialized Input Device Types

KVM Switches

Input Device Selection Tips

Input Device Installation Considerations

Demo - Configuring Input Devices

Topic C: Install and Configure Expansion Cards

Expansion Card Types

Card Selection Tips

Card Installation Considerations

Expansion Card Configuration

Topic D: Install and Configure Multimedia Devices

Multimedia Devices

Common Multimedia Devices

Multimedia Device Selection Tips

Multimedia Device Installation Considerations

Multimedia Device Configuration

Lesson 04 Review

Lab: Peripheral Components 4.5hrs

Lesson 05 - Managing System Components 5hrs

Topic A: Motherboards

Motherboard Sizes/Form Factors

Expansion Slots

RAM Slots

Integrated I/O Port Types

Chipsets

CMOS Battery

Live Demo - Replacing CMOS Battery

Jumpers and DIP Switches

Front Panel Connectors

Fan Connectors

Live Demo - Cooling Fins and a Fan

Live Demo - Processor Fan

Bus Speeds

Motherboard Power Connectors

Live Demo - Motherboard Power Connectors

Motherboard Selection Tips

Page 93: €¦ · 2 Table of Contents Introduction

93

Motherboard Installation Considerations

Live Demo – Motherboard

Topic B: CPUs and Cooling Systems

CPU Sockets

Intel CPU Socket Types

AMD CPU Socket Types

Cache

CPU Operational Characteristics

CPU Selection Factors

Cooling System Types

Cooling System Selection Factors

Live Demo - Cooling Method

Topic C: Select and Install Power Supplies

Power Supply Specifications

Power Supply Connections

Live Demo - Peripheral Power Connector

Power Supply Safety Recommendations

Selecting the Right Power Supply

Live Demo - Modern Power Supply

Live Demo - Legacy Power Supply

Topic D: RAM Types and Features

RAM Modules

Single-Sided and Double-Sided Memory

RAM Configurations

Types of RAM

ECC

Parity

RAM Characteristics

Topic E: Install and Configure Storage Devices

Media Capacity

RAID Standards

Common RAID Types

Internal Storage Device Considerations

External Storage Device Considerations

Demo - Installing an Internal Storage Device

Topic F: Configure the System BIOS

BIOS Memory

BIOS Components

Firmware Upgrades

BIOS Configuration Options

BIOS Diagnostics

BIOS Monitoring Capabilities

Page 94: €¦ · 2 Table of Contents Introduction

94

Lesson 05 Review

Lesson 06 - Installing and Configuring Operating Systems 5hrs

Topic A: Implement Virtualization

What is Virtualization?

Types of Virtualization

Components of a Virtual Environment

Virtual Desktop Infrastructure

Virtualization Requirements

Windows Client Virtualization Solutions

Demo - Creating a VM on Windows 7

Topic B: Install Microsoft Windows

Windows System Requirements

Hardware Compatibility

Boot Methods

Imaging

Installation Types

Third Party Drivers

Partitioning

Partitioning Types

Volumes

Partitioning and File System Types

Workgroups

Homegroups

Domains

Customizing System Options

Updates

Factory Recovery Partition

Microsoft Product Activation

Demo - Installing Microsoft Windows

Topic C: Windows Upgrades

In-Place Upgrades

Supported Upgrade Paths

Compatibility Tools

Topic D: Windows Preventive Maintenance

Data Backup and Restoration

Maintenance Tools

Scheduling Tasks

Patch Management

Managing Updates

Demo - Performing Preventive Maintenance

Lesson 06 Review

Page 95: €¦ · 2 Table of Contents Introduction

95

Lab: Installing and Configuring Operating Systems 4.5hrs

Lesson 07 - Customized Client Environments 5hrs

Topic A: Standard Clients

What is a Standard Client?

Client Requirements

Virtualization Workstation

Virtualization Workstation Requirements

Topic B: Custom Client Environments

Media Design Workstations

Media Design Workstation Requirements

Audio/Video Editing Workstations

Audio/Video Editing Hardware Requirements

Gaming PCs

Gaming PC Requirements

Home Theater PC

Home Theater PC Requirements

Home Server PC

Home Server Requirements

Lesson 07 Review

Lesson 08 - Networking Technologies 5hrs

Topic A: Physical Network Connections

Networks

Network Models

Network Interface Card Characteristics

Twisted Pair Cables

Types of Twisted Pair Cable

PVC Cable and Plenum Cabling

Twisted Pair Connectors

Coaxial Cables

Coaxial Cable and Connector Types

Live Demo - Coax and Coax Networks

Fiber Optic Cables

Fiber Optic Cable Types

Fiber Optic Connector Types

Wireless Connections

Additional Network Connection Methods

Topic B: TCP/IP

TCP/IP

IPv4 Addresses

Subnet Masks

Gateways

IP Address Classes

Page 96: €¦ · 2 Table of Contents Introduction

96

IPv6 Addresses

The IPv6 Address Format

IPv4 vs. IPv6

Addressing Schemes

Static vs. Dynamic Addressing

DHCP

DNS

Client-Side DNS

Demo - Identifying Your Computer's TCP/IP Information

Topic C: Network Connectivity

LANs

WANs

PANs

MANs

VPNs

Ethernet

Network Topologies

Network Device Types and Features

ISPs

Broadband Communications

Internet Connection Types and Features

Topic D: Ports and Protocols

Ports

TCP vs. UDP

Port Ranges

Common Ports

LDAP

SNMP

SSH

SFTP

SMB

Topic E: Set Up and Configure Windows Networking

Directory Services

Windows Networking Options

Demo - Joining a Computer to a Domain

Network Shares

Demo - Creating a Network Share

Network Connection Types

Proxy Settings

Remote Desktop

Network Location Settings

Firewall Settings

Page 97: €¦ · 2 Table of Contents Introduction

97

Alternative IP Address Configuration Methods

Network Card Properties

Live Demo - Network Cards and Cables

Topic F: Networking Tools

Cable Testers

Crimpers

Multimeter

Toner Probe

Loopback Plug

Punch Down Tool

Networking Utilities

Demo - Identifying Networking Tools

Lesson 08 Review

Lab: Networking Technologies 4.5hr

Lab: Multimeter and Cables 2.5hrs

Lesson 09 - Installing, Configuring, and Maintaining SOHO Networks 5hrs

Topic A: Install and Configure SOHO Networks

SOHO Networks

Firewalls and SOHO Networks

DMZs

NAT Implementations

WPS

Basic QoS

802.11 Wireless Standards

WAPs

SSID

Encryption

Wireless Encryption Types

Router Settings and Configurations

Live Demo - Configure Router

Topic B: SOHO Network Security

Common SOHO Security Methods

Wireless Security

SOHO Wireless Security Methods

Wireless Client Configuration Options

Lesson 09 Review

Lesson 10 - Supporting Laptops 5hrs

Topic A: Laptop Hardware and Components

Laptops

Laptop Hardware Components

Types of Laptop Displays

Laptop Display Components

Page 98: €¦ · 2 Table of Contents Introduction

98

Internal Laptop Components

Laptop Expansion Options

Special Function Keys

Laptop Docking Solutions

Laptop Locks

Laptop Power Supplies and Batteries

Demo - Power Options

Auto-Switching and Fixed Input Power Supplies

Laptop Cooling Considerations

Topic B: Install and Configure Laptop Hardware Components

General Laptop Support Guidelines

Live Demo - Inside of Laptop

Lesson 10 Review

Lesson 11 - Mobile Computing 5hrs

Topic A: Mobile Device Technologies

What is Mobile Technology?

Mobile Operating Systems

Smartphones

Tablet PCs

Tablets vs. Laptops

Mobile Device Features

Topic B: Configure Mobile Devices

Mobile Security

Mobile Device Security Techniques

Network Configuration Settings

Bluetooth Configuration Methods

The Bluetooth Pairing Process

Data Synchronization

Synchronization Requirements

Email Configuration Methods

Email Server and Configuration Settings

Lesson 11 Review

Lesson 12 - Supporting Printers 5hrs

Topic A: Printer Technologies

Printers

An MFD

Laser Printers

The Laser Print Process

Inkjet Printers

The Inkjet Print Process

Duplexing

Page 99: €¦ · 2 Table of Contents Introduction

99

Thermal Printers

Thermal Print Processes

Impact Printers

The Impact Print Process

Topic B: Install, Configure, and Maintain Printers

Technical Printer Components

Printer Supplies and Media

Printer Driver Types

Printer Driver Compatibility

Local and Network-Based Printers

Print Device Sharing

Printer Configuration Options

Printer Maintenance

Live Demo - Printers

Demo - Installing a Local Printer

Lesson 12 Review

Lab: Supporting Printers 2hr

Lesson 13 – Security 5hrs

Topic A: Security Fundamentals

Corporate Security Policies

Security Incident Reports

The Principle of Least Privilege

Strong Passwords

User Education

Common User Security Practices

Authentication Methods

Topic B: Security Threats and Vulnerabilities

Malware

Types of Malware

Social Engineering

Physical Security Threats and Vulnerabilities

Common Wireless Security Threats

Topic C: Security Protection Measures

Physical Security

Physical Security Measures

Digital Security

Antivirus Software

Anti-Spyware Software

Firewalls

Social Engineering Prevention Techniques

Hard Drive Sanitation

Formatting Hard Drives for Disposal

Page 100: €¦ · 2 Table of Contents Introduction

100

Physical Destruction Methods for Computer Media

Topic D: Workstation Security

Windows Security Policies

Windows Firewall

Software Firewall Configuration Settings

Workstation Security Best Practices

Demo - Securing a Workstation

Lesson 13 Review

Lab: Security 4.5hrs

Lab: Comparing Workgroup Security and Domain Security 4.5hrs

Lesson 14 - Troubleshooting Hardware Components 5hrs

Topic A: Troubleshooting Theory

Troubleshooting Theory

Troubleshooting Models

Troubleshooting Template Forms

Topic B: Troubleshoot Video and Display Devices

Common Video and Display Issues

Topic C: Troubleshoot Hard Drives and RAID Arrays

Drive and Array Troubleshooting Tools

Common Hard Drive Symptoms

Common RAID Array Issues

SATA Troubleshooting Tips

PATA Troubleshooting Tips

SCSI Troubleshooting Tips

Topic D: Troubleshoot System Components

Common System Troubleshooting Tools

Common CPU Issues

Common Cooling System Issues

Common Motherboard Issues

Repair vs. Replace

Common RAM Issues

Common External Power Source Problems

Common Power Supply Problems

Power Supply Troubleshooting Considerations

Topic E: Troubleshoot Laptops

Maintenance and Handling Techniques

Operating Environment Best Practices

General Laptop Issues

Common Laptop Keypad Issues

Common Wireless Connectivity Issues

Laptop Disassembly Best Practices

Topic F: Troubleshoot Printers

Page 101: €¦ · 2 Table of Contents Introduction

101

Common Printer Troubleshooting Tools

Printer Software Tools

Common Printer Symptoms

Lesson 14 Review

Lesson 15 - Troubleshooting System-Wide Issues 5hrs

Topic A: Troubleshoot Operating Systems

Operating System Troubleshooting Tools

BSOD

System Lockup Errors

Input/Output Device Issues

Application Errors

Boot Issues

Common Operating System Symptoms

Error and Warning Messages in Event Viewer

Registry Error Messages

Demo - Troubleshooting a Remote Computer with Remote Desktop

Topic B: Troubleshoot Wired and Wireless Networks

Common Network Issues

Network Troubleshooting Utilities

Network Troubleshooting Tools

Demo - Troubleshooting Network Issues

Topic C: Troubleshoot Common Security Issues

Common Security Issues

Malware Removal Process

Malware Removal Best Practices

Security Troubleshooting Tools

Lesson 15 Review

Course Closure

Lab: Troubleshooting System-Wide Issues 4.5hrs

Lab: Teardown and Re-build of PC 4.5hrs

NH5300 CompTIA Security + 104 Total Hours

70 Theory Hours

34 Lab Hours

COURSE TITLE: CompTIA Security + PREREQUISITE: NH5000 or NH5200, or equivalent knowledge or experience

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After taking this course, students will understand the field of network security and how it

relates to other areas of information technology.

Page 102: €¦ · 2 Table of Contents Introduction

102

COURSE OBJECTIVES: This course provides the broad-based knowledge necessary to prepare for further study

in specialized security fields, or it can serve as a capstone course that gives a general introduction to network

security

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

CompTIA Security+ Certification, Exam SY0-301 +CertBlaster, Student Manual (2011) – Axzo Press

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assessments are given at the end of each module.

COURSE OUTLINE:

Unit 1: Mitigating threats 5hrs

Topic A: System maintenance

Topic B: Application security

Topic C: Physical security

Topic D: Malware

Topic E: Social engineering

Lab: Mitigating Threats 4hrs

Unit 2: Cryptography 5hrs

Topic A: Symmetric cryptography

Topic B: Public key cryptography

Lab: Cryptography 3hrs

Unit 3: Authentication 5hrs

Topic A: Authentication factors and requirements

Topic B: Authentication systems

Topic C: Authentication system vulnerabilities

Lab: Authentication 3hrs

Unit 4: User- and role-based security 5hrs

Topic A: Baseline security policies

Topic B: Resource access

Lab: User- and role-based security 3hrs

Unit 5: Peripheral security 5hrs

Topic A: File and disk encryption

Topic B: Peripheral and component security

Topic C: Mobile device security

Lab: Peripheral Security 3hrs

Unit 6: Public key infrastructure 5hrs

Topic A: Public key cryptography

Topic B: Implementing public key infrastructure

Topic C: Web server security with PKI

Lab: Public key infrastructure 3hrs

Unit 7: Application and messaging security 5hrs

Topic A: Application security

Topic B: E-mail security

Topic C: Social networking and messaging

Page 103: €¦ · 2 Table of Contents Introduction

103

Lab: Application and messaging security 3hrs

Unit 8: Ports and protocols 5hrs

Topic A: TCP/IP basics

Topic B: Protocol-based attacks

Lab: Ports and protocols 3hrs

Unit 9: Network security 5hrs

Topic A: Network devices

Topic B: Secure network topologies

Topic C: Secure networking

Topic D: Virtualization and cloud computing

Lab: Network Security 3hrs

Unit 10: Wireless security 5hrs

Topic A: Wireless network security

Topic B: Mobile device security

Unit 11: Remote access security 5hrs

Topic A: Remote access

Topic B: Virtual private networks

Lab: Remote Access Security 3hrs

Unit 12: Vulnerability testing and monitoring 5hrs

Topic A: Risk and vulnerability assessment

Topic B: Auditing and logging

Topic C: Intrusion detection and prevention systems

Topic D: Incident response

Lab: Vulnerability testing and monitoring 3hrs

Unit 13: Organizational security 5hrs

Topic A: Organizational policies

Topic B: Education and training

Topic C: Disposal and destruction

Unit 14: Business continuity 5hrs

Topic A: Business continuity planning

Topic B: Disaster recovery

Topic C: Environmental controls

NH9000 Certified Ethical Hacker 104 Total Hours 90 Theory Hours

14 Laboratory Hours

COURSE TITLE: Certified Ethical Hacker

PREREQUISITE: None

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day

or evening sessions)

COURSE LENGTH: 104 hours

Page 104: €¦ · 2 Table of Contents Introduction

104

COURSE OVERVIEW: This class will immerse the student into an interactive environment where they will be

shown how to scan, test, hack and secure their own systems. Students then learn how intruders escalate privileges

and what steps can be taken to secure a system.

COURSE OBJECTIVES: This class will immerse the students into an interactive environment where they will be

shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-

depth knowledge and practical experience with the current essential security systems. Students will begin by

understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no

real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a

system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks,

Buffer Overflows and Virus Creation.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Logical Operations (2012): EC-Council Certified Ethical Hacking and Countermeasures v8 Student Kit. EC-

Council Publishing

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations.

COURSE OUTLINE:

Module 01: Introduction to Ethical Hacking 5hrs

Internet Crime Current Report: IC3

Data Breach Investigations Report

Types of Data Stolen From the Organizations

Essential Terminologies

Elements of Information Security

Module 02: Footprinting and Reconnaissance 5hrs

Footprinting Terminologies

What is Footprinting?

Objectives of Footprinting

Footprinting Threats

Finding a Company’s URL

Locate Internal URLs

Module 03: Scanning Networks 5hrs

Network Scanning

Types of Scanning

Checking for Live Systems - ICMP Scanning

Ping Sweep

Ping Sweep Tools

Module 04: Enumeration 5hrs

What is Enumeration?

Techniques for Enumeration

Netbios Enumeration

NetBIOS Enumeration Tool: SuperScan

NetBIOS Enumeration Tool: NetBIOS Enumerator

Enumerating User Accounts

Enumerate Systems Using Default Passwords

Module 05: System Hacking 5hrs

Page 105: €¦ · 2 Table of Contents Introduction

105

Information at Hand Before System Hacking Stage

System Hacking: Goals

CEH Hacking Methodology (CHM)

Password Cracking

Password Complexity

Password Cracking Techniques

Types of Password Attacks

Module 06: Trojans and Backdoors 5hrs

What is a Trojan?

Overt and Covert Channels

Purpose of Trojans

What Do Trojan Creators Look For?

Indications of a Trojan Attack

Common Ports used by Trojans

How to Infect Systems Using a Trojan?

Wrappers

Wrapper Covert Programs

Different Ways a Trojan can Get into a System

How to Deploy a Trojan?

Module 07: Viruses and Worms 5hrs

Introduction to Viruses

Virus and Worm Statistics 2010

Stages of Virus Life

Working of Viruses: Infection Phase

Working of Viruses: Attack Phase

Why Do People Create Computer Viruses?

Indications of Virus Attack

How does a Computer get Infected by Viruses?

Virus Hoaxes

Virus Analysis

Module 08: Sniffers 5hrs

Lawful Intercept

Benefits of Lawful Intercept

Network Components Used for Lawful Intercept

Wiretapping

Sniffing Threats

Module 09: Social Engineering 5hrs

What is Social Engineering?

Behaviors Vulnerable to Attacks

Factors that Make Companies Vulnerable to Attacks

Why is Social Engineering Effective?

Page 106: €¦ · 2 Table of Contents Introduction

106

Warning Signs of an Attack

Module 10: Denial of Service 5hrs

What is a Denial of Service Attack?

What is Distributed Denial of Service Attacks?

How Distributed Denial of Service Attacks Work?

Symptoms of a DoS Attack

Cyber Criminals

Organized Cyber Crime: Organizational Chart

Internet Chat Query (ICQ)

Module 11: Session Hijacking 5hrs

What is Session Hijacking?

Dangers Posed by Hijacking

Why Session Hijacking is Successful?

Key Session Hijacking Techniques

Brute Forcing

Brute Forcing Attack

HTTP Referrer Attack

Spoofing vs. Hijackin

Module 12: Hijacking Webservers 5hrs

Webserver Market Shares

Open Source Webserver Architecture

IIS Webserver Architecture

Website Defacement

Case Study

Why Web Servers are Compromised?

Impact of Webserver Attacks

Webserver Misconfiguration

Module 13: Hacking Web Applications 5hrs

Web Application Security Statistics

Introduction to Web Applications

Web Application Components

How Web Applications Work?

Web Application Architecture

Web 2.0 Applications

Module 14: SQL Injection 5hrs

SQL Injection is the Most Prevalent Vulnerability in 2010

SQL Injection Threats

What is SQL Injection?

SQL Injection Attacks

How Web Applications Work?

Page 107: €¦ · 2 Table of Contents Introduction

107

Server Side Technologies

Module 15: Hacking Wireless Networks 5hrs

Wireless Networks

Wi-Fi Usage Statistics in the US

Wi-Fi Hotspots at Public Places

Wi-Fi Networks at Home

Types of Wireless Networks

Wireless Standards

Service Set Identifier (SSID)

Wi-Fi Authentication Modes

Module 16: Evading IDS, Firewalls, and Honeypots 5hrs

Intrusion Detection Systems (IDS) and its Placement

How IDS Works?

Ways to Detect an Intrusion

Types of Intrusion Detection Systems

System Integrity Verifiers (SIV)

General Indications of Intrusions

General Indications of System Intrusions

Module 17: Buffer Overflow 5hrs

Buffer Overflows

Why are Programs And Applications Vulnerable?

Understanding Stacks

Stack-Based Buffer Overflow

Understanding Heap

Heap-Based Buffer Overflow

Stack Operations

Shellcode

Module 18: Cryptography 5hrs

Cryptography

Types of Cryptography

Government Access to Keys (GAK)

Ciphers

Advanced Encryption Standard (AES)

Data Encryption Standard (DES)

RC4, RC5, RC6 Algorithms

The DSA and Related Signature Schemes

RSA (Rivest Shamir Adleman)

Module 19: Penetration Testing 5hrs

Introduction to Penetration Testing

Security Assessments

Vulnerability Assessment

Page 108: €¦ · 2 Table of Contents Introduction

108

LAB: Review exercises 14hrs

Page 109: €¦ · 2 Table of Contents Introduction

109

Computer and Network Support Technician Educational objectives:

The Computer and Network Support Technician Program is a three part program. Part 1: Microsoft Office: This program is designed to provide the students with Beginning to Intermediate knowledge of Microsoft Office applications: Word, Excel, PowerPoint, and Outlook. Part 2: A+ Comprehensive: The student will be taught the skills necessary to assemble, repair, troubleshoot, and configure a computer. The student will teardown and re-build a fully functional, state of the art computer. Part 3: Net+ Networking Fundamentals: Provides students with the fundamentals of networking by giving them hands-on training in networking skills and concepts that affect many aspects of networking. Students will cover such topics as: basic networking, protocols, network devices, TCP/IP architecture, internet addressing, routing, servers, remote connectivity, user management, network security, encryption and firewalls, as well as troubleshooting and diagnostic tools. The Network+ course is widely accepted as the prerequisite course for Cisco CCNA and Microsoft Certifications. We also include interactive computer lab hours in this program, to further support the learning experience. Upon completion of the program, the student will be able to successfully function within the Microsoft Office suite, assemble, repair or upgrade computer hardware, install software and set-up or troubleshoot networks. The student will have acquired the skills necessary to obtain an entry-level position as a Computer Support Specialist, Call Center Support, Teleservice Operations, Customer Service Representative, Technical Support Specialist, Help Desk Technician, Network and Computer Systems Administrator, Hardware Specialist, PC Technician, and Desktop Support Technician. Course Tuition: $4,995.00 Total Hours: 424 Hours Grading Scale: A= 100-93 B= 92-83 C= 82-73 D= 72-63 F= Below 62 I= Incomplete W= Withdrew

COURSE TITLE: Microsoft Office Basic

PREREQUISITE: None

NH200 Microsoft Office Basic 80 Total Hours 60.5 Theory Hours

19.5 Laboratory Hours

Page 110: €¦ · 2 Table of Contents Introduction

110

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day

or evening sessions)

COURSE LENGTH: 80 Hours

COURSE OVERVIEW: This course is intended for individuals who are looking to familiarize themselves with the basics of personal computers and the basics of Microsoft Office Applications

Including:

Managing files, folders, and libraries, as well as options for customizing the Windows 7 environment.

Create and edit simple documents; format documents; add tables and lists; add design elements and layout options; and proof documents.

Create spreadsheets and workbooks that can be used to store, manipulate, and share data.

Create and deliver engaging multimedia presentations that convey the key points of your message through the use of text, graphics, and animations.

Manage all aspects of email communication.

Enhance the appearance of documents by formatting text, paragraphs, and documents

Find and replace text

Use proofing tools to correct spelling and grammar errors

Work with basic formulas and functions

Use multiple worksheets

Enhance worksheets

Use styles and AutoFormats

Work with charts.

Use and create Outlook templates and forms

Work with proofing tools and objects

Use WordArt and clip art

Build slide shows

Play slide shows

COURSE OBJECTIVES: This course will introduce the Windows 7 environment to students with little to no experience working with the Windows operating system. Students will be introduced to topics such as the start menu, the desktop, managing files, folders, and libraries, as well as options for customizing the Windows 7 environment. This course also provides students with the knowledge and skills to create and edit simple documents; format documents; add tables and lists; add design elements and layout options; and proof documents, create spreadsheets and workbooks that can be used to store, manipulate, and share data, manage email and calendars, and create and deliver engaging multimedia presentations that convey the key points of your message through the use of text, graphics, and animations.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS: Axzo Press (2009): Windows 7: Basic + CertBlaster, Student Manual. Axzo Press Publishing

Page 111: €¦ · 2 Table of Contents Introduction

111

Logical Operations (2013) - LogicalCHOICE Microsoft Office Word 2013: Part 1 – Logical Operations Logical Operations (2013) - LogicalCHOICE Microsoft Office Excel 2013: Part 1 – Logical Operations Logical Operations (2013) - LogicalCHOICE Microsoft Office Outlook 2013: Part 1 – Logical Operations Logical Operations (2013) - LogicalCHOICE Microsoft Office PowerPoint 2013: Part 1 – Logical Operations Office Suite 2013 Virtual PC INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assessments are given at the end of each module.

COURSE OUTLINE:

Unit 01 - The Windows 7 Environment 2.5 hrs

Topic: The Windows 7 Desktop

Logging on

Windows 7 Desktop Components

Demo - Desktop Tour

The Mouse and Mouse Pointer

Demo - Mouse

Topic: The Taskbar and Start Menu

The Start Menu

Demo - Start Menu

Taskbar with Open Applications

Demo - Switching Applications

Topic: Window Management

Window Management

Moving and Resizing Windows

Demo - Sizing Windows

Windows Program Components

Control Menu and Buttons

Menu Bar

Ribbon vs. Toolbar

Dialog Boxes

Demo - Commands

The Save As Dialog Box

Demo - Save As

Topic: Windows Help and Support

Windows Help and Support

Windows Help and Support Toolbar

Demo - Help

Shutdown and Logoff Options

Unit 01 Review

Unit 02 - Files, Folders, and Libraries 2.5hrs

Page 112: €¦ · 2 Table of Contents Introduction

112

Topic: Folders and Libraries

The Folder Hierarchy

Demo - Folder Hierarchy

Windows Explorer Components

Libraries

A Library’s Included Locations

Creating And Deleting Libraries

Demo - Library

Folder Naming Conventions

Renaming a Folder

Topic: Working with Files

Opening Files

File Extensions and Associates

Changing File Associates

Demo - File Association

Creating a Text File

The Save As Dialog Box

Printing Files

Demo - Printing

Moving Files and Folders

Copying Files and Folders

Deleting Files and Folders

Restoring Deleted Files

Demo - Move, Copy, Delete

Unit 02 Review

Unit 03 - Managing Content 2hrs

Topic: Working with Windows Explorer

View Options

Choosing Folder Details

Sorting Files

Stacks

Metadata

Demo - Customizing Explorer

Topic: Searching for Content

Search Boxes

Indexed Locations

Folder Searching Options

Demo - Search

Unit 03 Review

Page 113: €¦ · 2 Table of Contents Introduction

113

Unit 04 - Customizing the Environment 2.5hrs

Topic: Icons and Shortcuts

Taskbar Icons

A Jump List

Creating Shortcuts

Desktop Shortcuts

Arranging Desktop Icons

Customizing the Start Menu

Removing Start Menu Icons

Deleting a Shortcut

Adding a Folder to Favorites

Demo - Shortcuts

Demo - Custom Taskbar and Start Menu

Demo - Favorites

Topic: Gadgets

Some Desktop Gadgets

The Gadget Gallery

Gadget Settings

Demo - Gadgets

Topic: System Settings

The Control Panel

Setting Mouse Properties

Demo - Mouse Properties

Setting Keyboard Properties

Personalizing Windows

Changing the Background

Setting a Screen Saver

Demo - Desktop and Wallpaper

Sound Settings

Unit 04 Review

Unit 05 - Internet Explorer 8 2.5hrs

Topic: Web Browsing

Internet Software

Internet Explorer

Internet Explorer 8

Demo - Internet Explorer

Hyperlinks

URLs and the Address Bar

The History List

Topic: Tabbed Browsing

Page 114: €¦ · 2 Table of Contents Introduction

114

Tabs

Tabbed Browsing

Internet Options

Demo - Tabbed Browsing

Topic: Web Searching

Search Tips

Google Services

Demo - Search Engines

Topic: Customization

The Favorites List

Deleting Your Browsing History

Demo - Privacy

Adding an RSS Feed

Demo - RSS

Topic: Multimedia Content

Windows Media Player

Playing Video

Demo - Video

Unit 05 Review

Windows 7 Basic Labs 4hrs

Unit 6 – Getting Started with Word 1.5hrs

Topic A: Identify the Components of the Word Interface

Word 2013 Landing Page

A Word Document

The Word Application Window

The Ribbon

The Backstage View

The Clipboard Task Pane

The Quick Styles Gallery

Print Layout View

Last Location Bookmark

The View Tab

Demo 1-1: Working with Components of the Word Application Window

Demo 1-2: Opening and Displaying a Document in Different Views

Demo 1-3: Applying Different Window Views

Demo 1-4: Using Zoom Options

Topic B: Create a Word Document

The Print Window

Demo 1-5: Creating a New Document

Demo 1-6: Saving a Word Document

Page 115: €¦ · 2 Table of Contents Introduction

115

Demo 1-7: Previewing and Printing a Document

Topic C: Help

The Word Help Window

Demo 1-8: Finding Help in Word

Lesson 06 Review

Unit 7 - Editing a Document 1.5hrs

Topic A: Find and Select Text

Demo 2-1: Navigating and Selecting Text

Topic B: Modify Text

Live Preview

Demo 2-2: Copying and Pasting Text

The Undo Command

The Redo Command

Demo 2-3: Using the Undo and Redo Commands

Topic C: Find and Replace Text

The Navigation Pane

The Find and Replace Dialog Box

Find Options

Demo 2-4: Finding and Replacing Text

Lesson 07 Review

Unit 8 - Formatting Text and Paragraphs 1.5hrs

Topic A: Apply Character Formatting

Fonts

The Mini Toolbar

The Format Painter

Demo 3-1: Applying Different Font Options to Text

Demo 3-2: Highlighting Text

Demo 3-3: Using the Format Painter to Format Text

Topic B: Align Text Using Tabs

Text Aligned with Tab Stops

The Tabs Dialog Box

Demo 3-4: Setting Tabs

Topic C: Display Text as List Items

Bulleted and Numbered Lists

Demo 3-5: Creating a Bulleted List

Demo 3-6: Creating a Numbered List

Topic D: Control Paragraph Layout

Indents Applied to Paragraphs

Demo 3-7: Setting Paragraph Alignment

Page 116: €¦ · 2 Table of Contents Introduction

116

Demo 3-8: Setting Indents in a Paragraph

Demo 3-9: Setting Spacing Options in a Document

Demo 3-10: Setting Hyphenation Options

Topic E: Apply Borders and Shading

Page and Paragraph Borders

Shading Applied to Bordered Text

The Borders and Shading Dialog Box

Demo 3-11: Adding Borders and Shading

Topic F: Apply Styles

Word Styles Applied to Text

The Quick Styles Gallery

The Styles Task Pane

Demo 3-12: Applying Styles

Topic G: Manage Formatting

The Reveal Formatting Task Pane

Demo 3-13: Reveal and Clear Formatting

Demo 3-14: Find and Replace Formatting

Lesson 08 Review

Unit 9 - Adding Tables 1.5hrs

Topic A: Insert a Table

Data Organized into a Table

The Quick Tables Gallery

Demo 4-1: Inserting a Table in a Document

Topic B: Modify a Table

The TABLE TOOLS LAYOUT Tab

The Table Properties Dialog Box

Demo 4-2: Inserting and Deleting Rows and Columns

Demo 4-3: Moving and Resizing Columns

Topic C: Format a Table

The TABLE TOOLS DESIGN Tab

Demo 4-4: Formatting a Table

Topic D: Convert Text to a Table

The Convert Text to Table Dialog Box

The Convert Table To Text Dialog Box

Demo 4-5: Converting Data

Lesson 9 Review

Unit 10 - Managing Lists 1.5hrs

Topic A: Sort a List

Demo 5-1: Sorting a List

Page 117: €¦ · 2 Table of Contents Introduction

117

Topic B: Renumber a List

Demo 5-2: Renumbering a List

Topic C: Customize a List

A Multilevel List

The Multilevel List Gallery

Demo 5-3: Creating a Multilevel List

Demo 5-4: Customizing a List's Appearance

Lesson 10 Review

Unit 11 - Inserting Graphic Objects 1.5hrs

Topic A: Insert Symbols and Special Characters

Symbols

Wingdings

Demo 6-1: Inserting Symbols and Special Characters in a Document

Topic B: Add Images to a Document

Clip Art

The PICTURE TOOLS FORMAT Tab

Demo 6-2: Adding an Image to a Document

Lesson 11 Review

Unit 12 - Controlling Page Appearance 1.5hrs

Topic A: Apply a Page Border and Color

The Page Border Tab

Demo 7-1: Applying a Page Border

Topic B: Add a Watermark

A Watermark

The Printed Watermark Dialog Box

Demo 7-2: Adding a Watermark to a Document

Topic C: Add Headers and Footers

Headers and Footers

The HEADER & FOOTER TOOLS DESIGN Tab

Demo 7-3: Inserting Headers and Footers

Demo 7-4: Modifying a Header and Footer

Topic D: Control Page Layout

Portrait and Landscape Orientations

Manual Page Breaks

The Page Setup Dialog Box

Demo 7-5: Controlling Page Layout

Lesson 12 Review

Unit 13 - Proofing a Document 1.5hrs

Topic A: Check Spelling and Grammar

Page 118: €¦ · 2 Table of Contents Introduction

118

The Spelling Pane

The Grammar Pane

Readability Statistics

The Word Count Dialog Box

Demo 8-1: Enabling Readability Statistics

Demo 8-2: Checking Spelling, Grammar, and Length of a Document

Topic B: Other Proofing Tools

The Thesaurus

Demo 8-3: Using the Thesaurus

The Research Task Pane

Demo 8-4: Using the Research Task Pane

Translating Selected Text

Research Options

Demo 8-5: Checking Accessibility

Lesson 13 Review

Unit 14 - Customizing the Word Environment 1.5hrs

Topic A: Customize the Word Interface

The Word Options Dialog Box

The AutoCorrect Dialog Box

Demo 9-1: Customizing the Quick Access Toolbar

Demo 9-2: Customizing the Ribbon

Demo 9-3: Setting AutoCorrect Options

Topic B: Additional Save Options

Word 2013 File Formats

Demo 9-4: Saving a Word Document in a Different File Format

Demo 9-5: Using the Compatibility Checker

Demo 9-6: Changing AutoSave Options

Demo 9-7: Recovering an Unsaved Document

Lesson 14 Review

Word Basic Labs 2.5hrs

Unit 15- Getting Started with Microsoft Excel 2013 1.5hrs

Topic A: Identify the Elements of the Excel Interface

Microsoft Excel 2013

Spreadsheets, Worksheets, and Workbooks

The Excel Interface

Cell References and the Formula Bar

The Go To Feature

ScreenTips and Key Tips

Demo 1-1: Excel Elements

Topic B: Create a Basic Worksheet

Page 119: €¦ · 2 Table of Contents Introduction

119

The Ribbon

The Backstage View

Data Types

Excel 2013 File Formats

SkyDrive

The Convert Option

The Compatibility Checker

Demo 1-2: Creating a Spreadsheet

Topic C: Use the Help System

The Excel Help Window

Demo 1-3: Using Help System

Lesson 15 Review

Unit 16 - Performing Calculations 1.5hrs

Topic A: Create Formulas in a Worksheet

Formulas

The Formula Bar

Elements of an Excel Formula

Common Mathematical Operators

The Order of Operations

Demo 2-1: Creating Formulas

Topic B: Insert Functions in a Worksheet

Functions

The Function Library

Using the AutoSum Button

The Formula AutoComplete Feature

Demo 2-2: Insert Functions in a Worksheet

Topic C: Reuse Formulas

The Cut, Copy, and Paste Commands

Relative References

Absolute References

Mixed References

Demo 2-3: Reusing Formulas

Lesson 16 Review

Unit 17 - Modifying a Worksheet 1.5hrs

Topic A: Manipulate Data

The Undo and Redo Commands

Auto Fill

Live Preview

The Clear Button

Page 120: €¦ · 2 Table of Contents Introduction

120

Demo 3-1: Manipulating Data

Topic B: Insert, Manipulate, and Delete Cells, Columns, and Rows

The Insert and Delete Options

The Hide and Unhide Options

Demo 3-2: Adjust Display of Columns

Topic C: Search for and Replace Data

Cell Names and Range Names

The Find Command

The Replace Command

Demo 3-3: Searching for and Replacing Data

Topic D: Spell Check a Worksheet

The Spelling Dialog Box

Demo 3-4: Spell Checking a Worksheet

Lesson 17 Review

Unit 18 - Formatting a Worksheet 1.5hrs

Topic A: Modify Fonts

Fonts

The Font Group

The Format Cells Dialog Box

Galleries

Live Preview and Formatting

The Mini Toolbar

Demo 4-1: Modifying Fonts

Topic B: Add Borders and Color to Cells

Border Options

Sheet Backgrounds

Demo 4-2: Adding Borders and Color to Cells

Topic C: Apply Number Formats

Number Formats

Number Formats in Excel

Demo 4-3: Applying Number Formats

Topic D: Align Cell Contents

The Indent Commands

The Wrap Text Command

Orientation Options

Demo 4-4: Aligning Cell Contents

Topic E: Apply Cell Styles

Cell Styles

Demo 4-5: Applying Cell Styles

Lesson18 Review

Page 121: €¦ · 2 Table of Contents Introduction

121

Lesson 19 - Printing Workbook Contents 1.5hrs

Topic A: Define the Basic Page Layout for a Workbook

The Page Setup Dialog Box

Workbook Views

Headers and Footers

Header and Footer Settings

Page Margins

Page Orientation

Demo 5-1: Previewing a Workbook Before Print

Demo 5-2: Applying Print Changes

Topic B: Refine the Page Layout and Apply Print Options

Zoom Options

Page Breaks

The Print Area

Printing Titles

Scaling Options

Demo 5-3: Refine Print Layout

Lesson 19 Review

Unit 20 - Managing Large Workbooks 1.5hrs

Topic A: Format Worksheet Tabs

Tab Formatting Options

Demo 6-1: Formatting Worksheet Tabs

Topic B: Manage Worksheets

Insertion and Deletion Options for Worksheets

Hide and Unhide Options

Worksheet References in Formulas

Demo 6-2: Managing Worksheets

Topic C: Manage the View of Worksheets and Workbooks

The Split Command

The Freeze Panes Options

The Arrange All Command

The View Side by Side Command

Demo 6-3: Managing the View of Worksheets and Workbooks

Lesson 20 Review

Unit 21 - Customizing the Excel Environment 2hrs

Topic A: Customize General and Language Options

The Excel Options Dialog Box

The General Options

The Language Options

Demo 7-1: Customizing General and Language Options

Page 122: €¦ · 2 Table of Contents Introduction

122

Topic B: Customize Formula Options

The Formulas Options

Demo 7-2: Formula Options

Topic C: Customize Proofing and Save Options

The Proofing Options

The Save Options

Demo 7-3: Customizing Proofing and Save Options

Topic D: Customize the Ribbon and Quick Access Toolbar

The Customize Ribbon Options

The Quick Access Toolbar Options

Demo 7-4: Customizing the Quick Access Toolbar

Topic E: Customize the Functionality of Excel by Enabling Add-Ins

What Are Add-Ins?

The DEVELOPER Tab

The Add-Ins Dialog Box

Demo 7-5: Customizing the Functionality of Excel

Topic F: Customize Advanced and Trust Center Options

The Advanced Options

The Trust Center Options

Demo 7-6: Customizing Advanced and Trust Center Options

Lesson 21 Review

Excel Basic Labs

5hrs

Unit 22- Getting Started with PowerPoint 1.5hrs

Topic A: Navigate the PowerPoint Environment

What Is PowerPoint?

Slides

The Start Screen

The PowerPoint 2013 User Interface

The Ribbon

Screen Tips

Dialog Box Launchers

The Quick Access Toolbar

The Left Pane

The Status Bar

Contextual Tabs

The Backstage View

Demo 1-1: Navigating the PowerPoint 2013 User Interface

Topic B: Create and Save a PowerPoint Presentation

The Default PowerPoint Presentation

Page 123: €¦ · 2 Table of Contents Introduction

123

Notes

The Save As Screen

Demo 1-2: Creating and Saving a PowerPoint Presentation

Topic C: Use Help

PowerPoint Help

The PowerPoint Help Toolbar

The Search Help Field

Demo 1-3: Using PowerPoint Help

Lesson 22 Review

Unit 23 - Developing a PowerPoint Presentation 1.5hrs

Topic A: Select a Presentation Type

Templates

Project Type Options

The Open Screen

Demo 2-1: Creating a Presentation from a Template

Topic B: View and Navigate a Presentation

Presentation Views

Master Views

Color View Options

SLIDE SHOW Tab

The Protected View

Demo 2-2: Viewing and Navigating a Presentation

Topic C: Edit Text

Text Boxes

The Mini Toolbar

Cut, Copy, and Paste Options

The Clipboard

The Clipboard Paste Options

The Paste Special Command

Galleries

Demo 2-3: Editing Text

Topic D: Building a Presentation

Types of Slide Layouts

Slide Size and Orientation

Themes

Theme Variants

Background Styles

The Format Background Pane

Demo 2-4: Adding, Deleting, and Modifying Slides

Demo 2-5: Arranging Slides

Page 124: €¦ · 2 Table of Contents Introduction

124

Demo 2-6: Working with Themes

Lesson 23 Review

Unit 24 - Performing Advanced Text Editing 1.5hrs

Topic A: Format Characters

The Font Dialog Box

WordArt Styles

The Format Painter

The Replace Fonts Option

Demo 3-1: Formatting Characters

Topic B: Format Paragraphs

Bulleted Lists

Numbered Lists

Demo 3-2: Using Bulleted and Numbered Lists

Text Alignment

Vertical Text Alignment

The Format Shape Pane

The AutoFit Feature

Spacing Options

Text Direction Options

Rulers

Demo 3-3: Formatting Paragraphs

Topic C: Format Text Boxes

Text Placeholder Formatting Options

Shape Fills

Shape Outlines

Shape Effects

Demo 3-4: Formatting Text Boxes

Lesson 24 Review

Unit 25 - Adding Graphical Elements to Your Presentation 1.5hrs

Topic A: Insert Clip Art and Images

Pictures

The Online Pictures Command

Clip Art

The Photo Album Feature

The Screenshot Tool

Demo 4-1: Inserting Clip Art and Images

Topic B: Insert Shapes

Shapes

The DRAWING TOOLS Contextual Tab

Page 125: €¦ · 2 Table of Contents Introduction

125

The Merge Shapes Feature

Edit Points

Demo 4-2: Inserting Shapes

Lesson 25 Review

Unit 26 - Modifying Objects in Your Presentation 1.5hrs

Topic A: Edit Objects

Object Selection Methods

Image Cropping

PICTURE TOOLS

The Remove Background Tool

Object Resizing Methods

Object Scaling Methods

Object Orientation Options

Image Compression Options

Demo 5-1: Editing Objects in your Presentation

Topic B: Format Objects

The Format Picture Pane

The Set Transparent Color Option

Picture Formatting Options

Demo 5-2: Formatting Pictures and Objects

Topic C: Group Objects

The Grouping Feature

Demo 5-3: Grouping Objects

Topic D: Arrange Objects

Object Order

Guides and Gridlines

Demo 5-4: Arranging Objects

Topic E: Animate Objects

Built-in Animation Effects

Demo 5-5: Animating Objects

Lesson 26 Review

Unit 27 - Adding Tables to Your Presentation 1.5hrs

Topic A: Create a Table

Tables

Table Creation Options

The Insert Table Dialog Box

Demo 6-1: Creating a Table

Topic B: Format a Table

The DESIGN Tab

Page 126: €¦ · 2 Table of Contents Introduction

126

The LAYOUT Tab

Table Styles

Demo 6-2: Formatting a Table

Topic C: Insert a Table from Other Microsoft Office Applications

The Insert Object Dialog Box

Demo 6-3: Inserting a Microsoft Excel Spreadsheet

Lesson 27 Review

Unit 28 - Adding Charts to Your Presentation 1.5hrs

Topic A: Create a Chart

Charts

Chart Data

Chart Types

Demo 7-1: Creating a Chart

Topic B: Format a Chart

The DESIGN Tab

The FORMAT Tab

The Quick Access Chart Commands

Chart Layouts

Chart Styles

Demo 7-2: Formatting a Chart

Topic C: Insert a Chart from Microsoft Excel

Demo 7-3: Inserting a Chart From Microsoft Excel

Lesson 28 Review

Unit 29 - Preparing to Deliver Your Presentation 1.5hrs

Topic A: Review Your Presentation

AutoCorrect Feature Options

The Spell Checker Feature

The Research Pane

Compatibility and Accessibility (1 of 2)

Compatibility and Accessibility (2 of 2)

Demo 8-1: Reviewing Your Presentations

Topic B: Applying Transitions

Transitions

Demo 8-2: Applying Transitions

Topic C: Print Your Presentation

The Print Command

Handouts

Outlines

Notes Pages

Page 127: €¦ · 2 Table of Contents Introduction

127

Full Page Slides

Demo 8-3: Setting Your Print Options

Topic D: Deliver Your Presentation

Presentation Options

PowerPoint Presentation File Formats

Demo 8-4: Presenting a Slide Show

Demo 8-5: Saving a Presentation as a PDF

Lesson 29 Review

PowerPoint Basic Labs 4hrs

Unit 30 – - Getting Started With Outlook 2013 1.5hrs

Topic A: Navigate the Outlook Interface

Email Addresses

Components of the Outlook Interface

Components of the Ribbon

The Backstage View

The Backstage View for an Email

The Mail Workspace

Read and Unread Messages

The Calendar Workspace

The People Workspace

Additional Outlook Tools

Peeks

Demo 1-1: Exploring the Outlook 2013 Interface

Topic B: Perform Basic Email Functions

The Message Form

Message Form Tabs

Message Response Options

Demo 1-2: Creating and Sending an Email

Inline Replies

Demo 1-3: Reading and Responding to Emails

Print Options

Demo 1-4: Printing an Email Message

The Deleted Items Folder

Demo 1-5: Deleting Email Messages

Topic C: Use Outlook Help

Outlook Help

Outlook Help Toolbar Buttons

Demo 1-6: Exploring Outlook Help

Lesson 30 Review

Unit 31 - Composing Messages 1.5hrs

Page 128: €¦ · 2 Table of Contents Introduction

128

Topic A: Create an Email Message

The Address Book

Global Address List

MailTips

Demo 2-1: Creating a New Email Message

Topic B: Check Spelling and Grammar

Automatic Spell Check

The Spelling and Grammar Dialog Box

Components of the Spelling and Grammar Dialog Box

Demo 2-2: Checking Spelling and Grammar in a Message

Topic C: Format Message Content

Live Preview

The Mini Toolbar

Demo 2-3: Formatting Message Content

Topic D: Attach Files and Items

The Paperclip Icon

Attachments in HTML or Plain Text Messages and Rich Text Messages

Outlook Items as Attachments

Attachment Reminder

Demo 2-4: Attaching a File to a Message

Topic E: Enhance an Email Message

The Illustrations Command Group

SmartArt

The Screenshot Tool

Text Commands

WordArt

Contextual Tabs

Contextual Tool Tabs

The Background Removal Tool

Galleries

Demo 2-5: Enhancing an Email Message with an Image

Styles

Themes

Demo 2-6: Enhancing an Email Message with SmartArt and Themes

Topic F: Manage Automatic Message Content

Stationery and Themes

Font Options

Demo 2-7: Specifying Font Options

Signatures

Demo 2-8: Creating and Applying an Email Signature

Page 129: €¦ · 2 Table of Contents Introduction

129

Lesson 31 Review

Unit 32 - Reading and Responding to Messages 1.5hrs

Topic A: Customize Reading Options

Desktop Alerts

Pane Views

Message Preview

Conversations

Demo 3-1: Customizing Your Reading Options

Topic B: Work with Attachments

Attachment Preview

Demo 3-2: Working with Attachments

Topic C: Manage Your Message Responses

The InfoBar

Voting and Tracking Options

Voting Options in an Email

A Delivery Receipt

A Read Receipt

Demo 3-3: Using Tracking Options

A Read Receipt (Cont.)

The Recall Option

Demo 3-4: Recalling a Sent Message

Lesson 32 Review

Unit 33 - Managing Your Messages 1.5hrs

Topic A: Manage Messages Using Tags, Flags, and Commands

Mark as Unread/Read

Color Categories

Demo 4-1: Using Tags to Manage Messages

Flag for Follow-Up

Demo 4-2: Using Flags to Manage Messages

The Ignore Conversation Command

Clean Up Commands

Demo 4-3: Using Commands to Manage Messages

Topic B: Organize Messages Using Folders

Default Email Folders

Email Folders on the Server

Demo 4-4: Organizing Messages Using Folders

Lesson 33 Review

Unit 34 - Managing Your Calendar 1.5hrs

Topic A: View the Calendar

Page 130: €¦ · 2 Table of Contents Introduction

130

Calendar Grid Arrangement Options

The Weather Bar

The Daily Task List

Calendar Layout Options

Demo 5-1: Customizing Your Calendar View

Topic B: Manage Appointments

The Appointment Form

Reminders

Show As Options

The Private Option

Demo 5-2: Creating an Appointment

Topic C: Manage Meetings

The Meeting Form

The Room Finder Pane

The Scheduling Assistant

Share Meeting Notes Using OneNote

Demo 5-3: Responding to a Meeting Request

Demo 5-4: Proposing a New Time for a Meeting

Demo 5-5: Creating a Recurring Meeting Request

Topic D: Print Your Calendar

Demo 5-6: Printing Your Calendar

Lesson 34 Review

Unit 35 - Managing Your Contacts 1.5hrs

Topic A: Create and Update Contacts

The People Hub

The Contact Form

Demo 6-1: Creating and Updating Contacts

Topic B: View and Organize Contacts

Contact Views

The Find Tool

Demo 6-2: Viewing and Organizing Your Contacts

Demo 6-3: Printing Your Contacts

Lesson 35 Review

Unit 36 - Working With Tasks and Notes 1.5hrs

Topic A: Manage Tasks

The Tasks Workspace

The Task Form

Task Views

Demo 7-1: Managing Tasks

Page 131: €¦ · 2 Table of Contents Introduction

131

Topic B: Manage Notes

The Notes Workspace

Note Views

Demo 7-2: Managing Notes

Lesson 36 Review

Unit 37 - Customizing the Outlook Environment 1.5hrs

Topic A: Customize the Outlook Interface

Demo 8-1: Customizing the Outlook Interface

Topic B: Create and Manage Quick Steps

Quick Steps

The Manage Quick Steps Dialog Box

Demo 8-2: Creating and Managing Quick Steps

Lesson 37 Review

Outlook Basic Labs 4hrs

NH201 Microsoft Office

Intermediate 120 Total Hours

80.5 Theory Hours

39.5 Laboratory Hours

COURSE TITLE: Microsoft Office Intermediate

PREREQUISITE: None

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day

or evening sessions)

COURSE LENGTH: 120 Hours

COURSE OVERVIEW: This course is intended for individuals who are looking to further themselves with the basics of personal computers and the intermediate to advanced levels of Microsoft Office Applications

Including:

Creating more complex documents that include lists, tables, charts, graphics, and newsletter layouts.

Merge data into documents to personalize correspondence and address envelopes and labels with the data.

Create and work with lengthy documents, collaborate with others on documents, and create forms in Microsoft Word.

Using advanced Excel 2013 functionality such as advanced formula creation, tables, charts, PivotTables/ PivotCharts and VLookups.

Skills to automate common tasks, audit workbooks to avoid errors, share data with other people, analyze data, and use Excel data in other applications.

User Accounts and installing devices and printers, file management and protection techniques.

Using utilities such as System Restore and configure networking in Windows.

Page 132: €¦ · 2 Table of Contents Introduction

132

COURSE OBJECTIVES: Students will learn some of the more advanced techniques for working with the Windows 7 environment. In addition to topics such User Accounts and installing devices and printers, file management and protection techniques will be addressed. Students will also learn how to use utilities such as System Restore and configure networking in Windows 7. This course provides students with the knowledge and skills to create more complex documents that include lists, tables, charts, graphics, and newsletter layouts. You will also merge data into documents to personalize correspondence and address envelopes and labels with the data as well.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Axzo Press (2009): Windows 7: Advanced + CertBlaster, Student Manual. Axzo Press Publishing Logical Operations (2013) - LogicalCHOICE Microsoft Office Word 2013: Part 2 – Logical Operations Logical Operations (2013) - LogicalCHOICE Microsoft Office Word 2013: Part 3 – Logical Operations Logical Operations (2013) - LogicalCHOICE Microsoft Office Excel 2013: Part 2 – Logical Operations Logical Operations (2013) - LogicalCHOICE Microsoft Office Excel 2013: Part 3 – Logical Operations Office Suite 2013 Virtual PC INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assessments are given at the end of each module.

COURSE OUTLINE:

Unit 01 - User Accounts 2.5hrs

Topic: Account Management

User Account

Two Types of User Accounts

User Account Privileges

Administrator and Guest Accounts

Manage Accounts

Creating a User Account

Editing a User Account

Account Pictures

Deleting Accounts

To Make Administrative Changes

Switching User Accounts

Ctrl+Alt+Delete Account Options

Demo - User Accounts

Topic: Password Management

Password Rules

Password Guidelines

Creating an Account Password

Disabling an Account

Demo - Delete and Disable Users

The Computer Management Window

Unit 01 Review

Page 133: €¦ · 2 Table of Contents Introduction

133

Unit 02 - Devices and Printers 2.5hrs

Topic: Devices

Interacting With Your Devices

Device Stage

The Device and Printers Window

Troubleshooting Devices

Windows ReadyBoost

Safely Remove Hardware and Eject Media

Demo - Devices

Topic: Printers

Adding a Printer

Changing a Default Printer

Printing Terms

Canceling a Print Job

Removing a Printer

Demo - Printers

Unit 02 Review

Unit 03 - File Management and Protection 2.5hrs

Topic: File and Folder Management

File Attributes

Setting File Attributes

Open the Folder Options Dialog Box

Demo - Files and Folders

Topic: File Protection

Backup and Restore

Configure Automatic Backups

Demo - Backup

Restoring Files and Folders

Demo - Restore

BitLocker To Go

Demo - BitLocker

Unit 03 Review

Unit 04 - Programs and Utilities 2.5hrs

Topic: Disk Maintenance

Disk Cleanup

Clean Up a Drive and Free Up Space

Demo - Disk Cleanup

Disk Defragmenter

Demo - Disk Defragmenter

Demo - Install a Program

Page 134: €¦ · 2 Table of Contents Introduction

134

Demo - Uninstalling a Program

Topic: System Restore

Restore Points

Creating a Restore Point

Demo - Create Restore Point

Restoring a PC to a Previous State

Demo - Using Restore Points

Topic: Troubleshooting

Windows Troubleshooting

Demo - Task Manager

Demo - Troubleshooting Problems

The Program Compatibility Wizard

The Problem Steps Recorder (PSR)

Demo - PSR

Advanced Startup Options

Demo - Advanced Startup Options

Unit 04 Review

Unit 05 - Networks and Mobile Computing 2.5hrs

Topic: Networks

Components of a Network

Local Area Network

Internet Connection Options

Network Models and Resources

Domains

Workgroups and Homegroups

The Network and Sharing Center

Network Locations

Remote Connection Options

Connect to a Workplace with a VPN

Demo - VPN

Connect to a Workplace Window

DirectAccess

Topic: File and Printer Sharing

Network Sharing Options

Sharing via Public Folders

Sharing Files with Specific Users

Demo - Folder Sharing

Unit 06 - Security 2.5hrs

Topic: User Account Control

Page 135: €¦ · 2 Table of Contents Introduction

135

Standard User Account Security

User Account Control Settings

Changing the UAC Settings

Demo - UAC

Topic: Windows Firewall

Windows Firewall

View the Status of Windows Firewall

Enable or Disable Windows Firewall

Set Windows Firewall Exceptions

Demo - Windows Firewall

Topic: Windows Update

Windows Updates

Configuring Automatic Updates

Checking for Updates

Demo - Windows Update

Topic: Malware Protection

Malware Types

The Action Center

Antivirus Software

Windows Defender

Configuring Windows Defender

Demo - Windows Defender

Topic: Internet Explorer Security and Privacy

Phishing

Security Zones

Custom Security Zones

Configuring the SmartScreen Filter

Clearing your Browsing History

Change Settings for Temporary Files

Third-party Cookies

InPrivate Browsing

InPrivate Filtering

Demo - Internet Explorer

Unit 06 Review

Windows 7 Advanced Labs 9 hrs

Unit 07 - Working with Tables and Charts 2hrs

Topic A: Sort Table Data

Single-Level Sort

Demo 1-1: Sorting Table Data

Topic B: Control Cell Layout

Page 136: €¦ · 2 Table of Contents Introduction

136

Merged Table Cells

Merged Title Row and Category Cells

Demo 1-2: Controlling Cell Layout

Topic C: Perform Calculations in a Table

Formula Examples

Number Format Masks

Formula Arguments

Equations

Demo 1-3: Performing Calculations in a Table

Topic D: Create a Chart

Chart Components as Seen in a Bar Chart

Chart Types

Caption Dialog Box

Demo 1-4: Creating a Chart

Lesson 07 Review

Unit 08 - Customizing Formats Using Styles and Themes 2hrs

Topic A: Create and Modify Text Styles

Built-In Style Examples

Styles on the Ribbon

Styles Task Pane Launcher

The Styles Task Pane

Linked Style

Kerning

Create New Style from Formatting Dialog Box

Create New Style from Formatting

Style Sets

Demo 2-1: Creating and Modifying Text Styles

Topic B: Create Custom List or Table Styles

Creating a New List Style

Creating a New Table Style

Demo 2-2: Creating and Modifying List and Table Styles

Topic C: Apply Document Themes

Themes Gallery

Save Current Theme Dialog Box

Demo 2-3: Applying Document Themes

Lesson 08 Review

Unit 09 - Using Images in a Document 2hrs

Topic A: Resize an Image

Picture Layout Size Options

Page 137: €¦ · 2 Table of Contents Introduction

137

Cropping Handles

Crop to Shape

Demo 3-1: Resizing an Image

Topic B: Adjust Image Appearance

The Adjust Group

Original and Corrected Image

Picture Corrections Options

More Corrections Options

Picture Color Options

More Picture Color Options

Artistic Effects Options

Pencil and Chalk Artistic Effects

Removing Background from an Image

Demo 3-2: Adjusting Image Corrections Options

Demo 3-3: Adjusting Image Color

Demo 3-4: Applying Artistic Effects

Demo 3-5: Adjusting Image Appearance

Demo 3-6: Removing the Background from an Image

Topic C: Integrate Pictures and Text

Layout Dialog Box Text Wrap Options

Layout Options Button

Text Wrapping Styles

Through Wrap Option with Wrap Points

Image Position

Layout Dialog Box Position Options

Horizontal Layout Positions

Vertical Layout Positions

Alignment Guides

Rotate Image

Demo 3-7: Integrating Pictures and Text

Topic D: Insert and Format Screenshots

Screenshot Tool

Demo 3-8: Inserting and Formatting Screenshots

Topic E: Insert Video

Video Link

Insert Video with Embed Code

Insert Video from Search

Demo 3-9: Inserting a Video Link

Lesson 09 Review

Unit 10 - Creating Custom Graphic Elements 2hrs

Page 138: €¦ · 2 Table of Contents Introduction

138

Topic A: Create Text Boxes and Pull Quotes

Examples of Pull Quote and Sidebar

Demo 4-1: Creating Text Boxes and Pull Quotes

Topic B: Draw Shapes

Shape Categories

Drawing Canvas

Demo 4-2: Drawing Shapes

Topic C: Add WordArt and Other Text Effects

WordArt Gallery

Drop Cap Formatting

Demo 4-3: Adding WordArt and Other Text Effects

Topic D: Create Complex Illustrations with SmartArt

Adding Text to a SmartArt Graphic

Choose a SmartArt Graphic Dialog Box

SmartArt Graphic Categories

Demo 4-4: Creating Complex Illustrations with SmartArt

Lesson 10 Review

Lesson 11 - Inserting Content Using Quick Parts 2hrs

Topic A: Insert Building Blocks

Quick Parts Menu

Building Blocks Organizer

Building Blocks Pane Columns

Demo 5-1: Inserting Building Blocks

Topic B: Create and Modify Building Blocks

Create New Building Block Dialog Box

Demo 5-2: Creating and Modifying Building Blocks

Topic C: Insert Fields Using Quick Parts

Quick Parts Menu

Field Codes and Field Values

Field Code Syntax

Field Dialog Box

Field Dialog Box Showing Field Codes

Field Code Categories

Demo 5-3: Inserting Fields Using Quick Parts

Lesson 11 Review

Unit 12 - Controlling Text Flow 2hrs

Topic A: Control Paragraph Flow

Paragraph Flow Control

Demo 6-1: Controlling Paragraph Flow

Page 139: €¦ · 2 Table of Contents Introduction

139

Topic B: Insert Section Breaks

Section Breaks

Demo 6-2: Inserting Section Breaks

Topic C: Insert Columns

Columns with Column Breaks

Columns Dialog Box with Custom Options Set

Demo 6-3: Inserting Columns

Topic D: Link Text Boxes to Control Text Flow

Linked Text Boxes

Demo 6-4: Linking Text Boxes to Control Text Flow

Lesson 12 Review

Unit 13 - Using Templates 2hrs

Topic A: Create a Document Using a Template

Word Templates

Template Storage Locations

Template and Template-Based Document

Demo 7-1: Creating a Document Using a Template

Topic B: Create a Template

MacroButton Syntax

Demo 7-2: Creating a Template

Lesson 13 Review

Unit 14 - Using Mail Merge 2hrs

Topic A: The Mail Merge Features

Mail Merge Fields and Merge Results

Data Source in a Word Table

Mail Merge Fields

Matching Mail Merge Fields

Insert Greeting Dialog Box

More Items Mail Merge Field

Mail Merge Rules

Mail Merge IF Rule

Mail Merge Data Sources

Mail Merge Process

MAILINGS Tab

Mail Merge Wizard Steps

Insert Merge Field Dialog Box

Mail Merge Recipients Dialog Box

SQL Warning Message

Demo 8-1: Performing a Mail Merge

Page 140: €¦ · 2 Table of Contents Introduction

140

Topic B: Merge Envelopes and Labels

Envelope with Merge Fields and Merge Results

Demo 8-2: Merging Envelope and Label Data

Topic C: Create a Data Source Using Word

Demo 8-3: Creating a Data Source Using Word

Lesson 14 Review

Lesson 15 - Using Macros 2hrs

Topic A: Automate Tasks Using Macros

Results of Running a Macro

Macros Dialog Box

Trust Center Options

The DEVELOPER Tab

Demo 9-1: Automating Tasks Using Macros

Topic B: Create a Macro

The Record Macro Dialog Box

Customize Keyboard Dialog Box

VBA Window

Demo 9-2: Creating a Macro

Lesson 15 Review

Word Intermediate labs 6hrs

Unit 16 - Collaborating on Documents 3hrs

Topic A: Modify User Information

Document Panel

Demo 1-1: Modifying User Information

Topic B: Share a Document

Demo 1-2: Sending a Document as an Attachment

Topic C: Compare Document Changes

Comparing Two Documents

Compare Documents Dialog Box

Demo 1-3: Comparing Document Changes

Topic D: Review a Document

Track Changes Options

Track Changes Indicator

Comments in Comment Pane

Comment Replies

Demo 1-4: Reviewing a Document

Topic E: Merge Document Changes

Combining Document Changes

Reviewing Pane

Topic F: Review Tracked Changes

Page 141: €¦ · 2 Table of Contents Introduction

141

Demo 1-5 & 1-6: Merging Document Changes and Accepting or Rejecting Changes

Topic G: Coauthor Documents

See Who Else is Editing the File

Notification of an Area Locked by Another User

Changes by Others are Highlighted in Green

Demo 1-7: Coauthoring a Document

Lesson 16 Review

Unit 17 - Adding Reference Marks and Notes 3hrs

Topic A: Add Captions

Captions

Caption Dialog Box

Demo 2-1: Adding Captions

Topic B: Add Cross-References

Cross-Reference in a Document

Demo 2-2: Adding Cross-References

Demo 2-3: Updating a Cross-Reference

Topic C: Add Bookmarks

Bookmark Dialog Box

Demo 2-4: Creating and Using Bookmarks

Topic D: Add Hyperlinks

Insert Hyperlink Dialog Box

Demo 2-5: Inserting Hyperlinks

Topic E: Insert Footnotes and Endnotes

Footnotes and Endnotes

Footnote and Endnote Dialog Box

Demo 2-6: Inserting Footnotes and Endnotes

Topic F: Add Citations and a Bibliography

Create Source Dialog Box

Demo 2-7: Inserting Citations and a Placeholder

Demo 2-8: Adding a Bibliography

Demo 2-9: Modify a Citation and Bibliography

Lesson 17 Review

Unit 18 - Simplifying and Managing Long Documents 3hrs

Topic A: Insert Blank and Cover Pages

Demo 3-1: Inserting Cover and Blank Pages

Topic B: Insert an Index

Index Dialog Box

Concordance File

Demo 3-2: Indexing a Document

Page 142: €¦ · 2 Table of Contents Introduction

142

Topic C: Insert a Table of Contents

Demo 3-3: Inserting a Table of Contents

Topic D: Insert an Ancillary Table

Mark Citation Dialog Box

Table of Authorities Dialog Box

Demo 3-4: Adding a Table of Figures

Demo 3-5: Adding a Table of Authorities

Topic E: Manage Outlines

Outline View

Demo 3-6: Creating and Organizing an Outline

Topic F: Create a Master Document

Master Document

Demo 3-7: Creating a Master Document

Demo 3-8: Modifying a Master Document

Lesson 18 Review

Unit 19 - Securing a Document 3hrs

Topic A: Suppress Information

Document Inspector Dialog Box

Demo 4-1: Hiding Text

Demo 4-2: Removing Personal Information from a Document

Topic B: Set Formatting and Editing Restrictions

Restrict Editing Task Pane

Demo 4-3: Setting Formatting and Editing Restrictions

Topic C: Add a Digital Signature to a Document

Digital Signature

Signatures Task Pane

Requested Signatures

Demo 4-4: Adding a Digital Signature to a Document

Topic D: Restrict Document Access

Demo 4-5: Setting a Password for a Document

Lesson 19Review

Unit 20 - Forms 3hrs

Topic A: Create Forms

Forms

Content Controls

Content Controls Panel

Demo 5-1: Using the Controls Group

Demo 5-2: Locking and Saving a Form

Topic B: Manipulate Forms

Page 143: €¦ · 2 Table of Contents Introduction

143

Demo 5-3: Adding and Removing Fields from a Form

Lesson 20 Review

Word Advanced Labs 9hrs

Unit 21 - Creating Advanced Formulas 2.5hrs

Topic A: Apply Range Names

Worksheet without Range Names

Worksheet with Range Names

Excel 2013’s Save Options

Where to Access Saved Versions

Demo 1-1: Adding Range Names

Demo 1-2 & 1-3: Editing and Deleting a Range Name

Demo 1-4: Using Range Names in a Formula

Topic B: Use Specialized Functions

The Function Library

Logical Functions

Statistical Functions

Syntax of the AVERAGE Function

The Insert Function Dialog Box

The Function Arguments Dialog Box

Demo 1-5: Locating Functions by Using the Function Reference

Demo 1-6: Using Functions

Lesson 21 Review

Unit 22 - Analyzing Data with Logical and Lookup Functions 2.5hrs

Topic A: Leverage Questions and Testing to Write Formulas

Topic B: Use Logical and Lookup Functions to Find Answers to Questions

Logical Functions

Demo 2-1: Working with Logical Functions

Demo 2-2: Combining IF and AND Functions

The VLOOKUP Function

The HLOOKUP Function

Demo 2-3: Working with Lookup Functions

Lesson 22 Review

Unit 23 - Organizing Worksheet Data with Tables 2.5hrs

Topic A: Create and Modify Tables

A Sample Table

The Create Table Dialog Box

The TABLE TOOLS DESIGN Contextual Tab

Demo 3-1: Converting a Range to a Table

Topic B: Sort and Filter Data

Page 144: €¦ · 2 Table of Contents Introduction

144

Data Sorted on a Single Column

Data Sorted on Multiple Columns

Filtered and Sorted Data

Advanced Filter with Three Criteria

Demo 3-2: Sorting Data and Removing Duplicate Records

Demo 3-3: Filtering Records

Topic C: Use Summary and Database Functions to Calculate Data

The SUBTOTAL Function

Demo 3-4: Using Subtotals with Range Data

Summary Functions in Table Total Row: Example 1

Summary Functions in Table Total Row: Example 2

Compare SUM to DSUM

Demo 3-5: Using Summary Functions in Tables

Demo 3-6: Using Database Functions

Lesson 23 Review

Unit 24 - Visualizing Data with Charts 2.5hrs

Topic A: Create Charts

Data in a Table

Data in a Chart

The Insert Chart Dialog Box

Demo 4-1: Creating Charts

Topic B: Modify and Format Charts

Demo 4-2: Modifying Charts

Demo 4-3: Formatting Charts

Topic C: Create a Trendline

Trendlines Forecasting Out Two Years

The Format Trendline Dialog Box

Demo 4-4: Creating a Trendline

Topic D: Create Advanced Charts

A Dual-Axes Chart

Demo 4-5: Creating a Dual-Axes Chart

Lesson 24 Review

Unit 25 - Analyzing Data with PivotTables, Slicers, and PivotCharts 2.5hrs

Topic A: Create a PivotTable

A Standard Table

A PivotTable

The PivotTable Field List Pane

The Summarize Values By Options

Summarizing Values by Using the MIN Function

Page 145: €¦ · 2 Table of Contents Introduction

145

The Show Values As Options

Showing Values As a Percent of the Grand Total

Combining Summarize and Show (Example 1)

Combining Summarize and Show (Example 2)

Demo 5-1: Creating PivotTables

Topic B: Filter Data by Using Slicers

Slicers and a PivotTable

Demo 5-2: Adding Slicers

Topic C: Analyze Data by Using PivotCharts

Slicers and a PivotChart

Demo 5-3: Creating a PivotChart

Lesson 25 Review

Unit 26 - Inserting Graphics 2.5hrs

Topic A: Insert and Modify Graphic Objects

The INSERT Tab’s Illustration Group

Types of Shapes

Demo 6-1: Inserting Pictures and Clip Art

Topic B: Layer and Group Graphic Objects

Layers

A Hidden Layer

The Same Layers in a New Stacking Order

Three Graphic Objects, No Grouping

Three Graphic Objects in One Group of Three

Demo 6-2: Inserting and Grouping Shapes

Topic C: Incorporate SmartArt

The Choose a SmartArt Graphic Dialog Box

Demo 6-3: Incorporating SmartArt

Lesson 26 Review

Unit 27 - Enhancing Workbooks 2.5hrs

Topic A: Customizing Workbooks

A Comment

Demo 7-1: Inserting Comments and Hyperlinks

Topic B: Manage Themes

Built-in Themes

Demo 7-2: Applying and Editing a Theme

Topic C: Create and Use Templates

An Expense Report Template

Demo 7-3: Creating a Template

Topic D: Protect Files

Page 146: €¦ · 2 Table of Contents Introduction

146

File Protection Options

The REVIEW Tab’s Changes Group

The Protect Sheet Dialog Box

The Protect Structure and Windows Dialog Box

Demo 7-4: Protecting a Worksheet and a Workbook

Lesson 27 Review

Excel Intermediate Labs 6.5hrs

Unit 28 - Automating Worksheet Functionality 3hrs

Topic A: Update Workbook Properties

Workbook Properties

Demo 1-1: Updating Workbook Properties

Demo 1-2: Modifying the Default Settings in Excel

Topic B: Create and Edit a Macro

Macros Icon

Record Macro Dialog Box

Naming Macros

Visual Basic for Applications

Demo 1-3: Creating a Macro

Demo 1-4: Editing a Macro

Topic C: Apply Conditional Formatting

Conditional Formatting

Conditional Formatting Rules Manager

Demo 1-5: Applying Conditional Formatting

Demo 1-6: Editing a Conditional Formatting Rule

Topic D: Add Data Validation Criteria

Data Validation

The Data Validation Dialog Box

Demo 1-7: Adding Data Validation Criteria

Lesson 28 Review

Unit 29 - Auditing Worksheets 3hrs

Topic A: Trace Cells

Trace Cells

Tracer Arrows

Demo 2-1: Tracing Cell Precedents and Dependents

Topic B: Troubleshoot Invalid Data and Formula Errors

The Error Checking Command

Data Validation

Demo 2-2: Troubleshooting Invalid Data

Demo 2-3: Troubleshooting Invalid Formulas

Topic C: Watch and Evaluate Formulas

Page 147: €¦ · 2 Table of Contents Introduction

147

Watch Window

The Evaluate Formula Icon

Demo 2-4: Evaluating a Formula

Topic D: Create a Data List Outline

Outlines

Demo 2-5: Creating a Data List Outline

Demo 2-6: Adding Subtotals to Grouped Data

Lesson 29 Review

Unit 30 - Analyzing and Presenting Data 3hrs

Topic A: Create Sparklines

Sparkline

The SPARKLINE TOOLS DESIGN Tab

Demo 3-1: Adding Sparklines to Your Worksheet

Demo 3-2: Editing Sparkline Data

Topic B: Create Scenarios

Scenarios

The Scenario Manager Dialog Box

Demo 3-3: Adding a Scenario

Demo 3-4: Editing Scenario Data

Topic C: Perform a What-If Analysis

Goal Seek Dialog Box

Solver Tool Parameters

Demo 3-5: Using Goal Seek

Demo 3-6: Installing the Solver Tool Add-In

Demo 3-7: Using Solver to Perform a What-If Analysis

Topic D: Perform a Statistical Analysis with the Analysis ToolPak

Analysis ToolPak

Demo 3-8: Performing a Data Analysis with Analysis ToolPak-Descriptive Statistics

Topic E: Create Interactive Data with Power View

A Power View Worksheet

Demo 3-9: Creating a Power View Worksheet

Lesson 30 Review

Unit 31 - Working With Multiple Workbooks 3hrs

Topic A: Consolidate Data

Data Consolidation

Demo 4-1: Consolidating Data

Topic B: Link Cells in Different Workbooks

Link Cells in Different Workbooks

Demo 4-2: Linking Cells in Different Workbooks

Page 148: €¦ · 2 Table of Contents Introduction

148

Demo 4-3: Editing Links

Topic C: Merge Workbooks

The Compare and Merge Workbooks Feature

Demo 4-4: Merging Workbooks

Lesson 31 Review

Unit 32 - Exporting Excel Data 3hrs

Topic A: Export Excel Data

Export

Demo 5-1: Exporting Excel Data

Topic B: Import a Delimited Text File

Text Import Wizard

Get External Data Group

Delimited Text Files

Demo 5-2: Importing a Delimited Text File

Topic C: Integrate Excel Data with the Web

File Publish

Publish as a Web Page Dialog Box

Demo 5-3: Publishing a Worksheet to the Web

Demo 5-4: Importing Data from the Web

Topic D: Create a Web Query

Web Queries

The New Web Query Dialog Box

Demo 5-5: Creating a Web Query

Lesson 32 Review

Excel Advanced Labs 9hrs

NH5000 A+ Comprehensive 120 Total Hours

75 Theory Hours

45 Lab Hours

COURSE TITLE: A+ Comprehensive PREREQUISITE: N/A

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 120 hours

COURSE OVERVIEW: After completing this course, students will be able to perform tasks such as:

Installation

Configuration

Diagnosing

Preventative Maintenance

Page 149: €¦ · 2 Table of Contents Introduction

149

Basic Networking

COURSE OBJECTIVES: CompTIA A+ Comprehensive is the starting point for a career in IT. The course covers

maintenance of PCs, mobile devices, laptops, operating systems and printers.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

LogicalCHOICE CompTIA A+ Certification: A Comprehensive Approach (Exams 220-801 and 220-802)

Print/Electronic Student Kit Training Bundle - Blended Kit – Logical Operations

1-2 “A+ machines”

Printer

Microsoft Operating System

Power Supply

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Course Introduction .5 hrs

Lesson 01 - Hardware Fundamentals 4.5hrs

Topic A: Computer System Components

Common Computer Components

Live Demo - Outside of the Computer

Live Demo - Inside of the Computer

The Motherboard

The CPU

Memory

The System Bus

Live Demo - Bus Slots

Topic B: Storage Devices

Storage Devices

Power Supplies

Cooling Systems

Expansion Cards

Riser Cards

Live Demo - Riser Card

Firmware

The System BIOS

The POST

Floppy Drives

Hard Drives

Types of Hard Drives

Live Demo - Drive Identification

Optical Disks

Optical Drives

Live Demo - Optical Drive Connections

Tape Drives

Page 150: €¦ · 2 Table of Contents Introduction

150

Solid State Storage

Types of Solid State Storage

Topic C: Device Connections and Interfaces

Ports

Computer Connections

Serial Connections

Live Demo - Serial Connectors

Parallel Connections

USB Connections

Live Demo - USB Connectors

IEEE 1394 and FireWire Connections

Live Demo - FireWire Cable

SCSI Connections

PATA Connections

SATA Connections

Live Demo - SATA Cable

Display Cable and Connector Types

Audio/Video Connections

Comparing Analog and Digital Video

Live Demo - Identifying Video Adapter Types

Wireless Device Connections

Lesson 01 Review

Lesson 02 - Operating System Fundamentals 5hrs

Topic A: Personal Computer Operating Systems

Microsoft Windows

Microsoft Windows Features

Microsoft Windows 7 Versions

Microsoft Windows Vista Versions

Microsoft Windows XP Versions

Other Operating Systems

Topic B: Windows Control Panel Utilities

The Control Panel

Internet Options

Display

User Accounts

Folder Options

System

Action Center

Windows Firewall

Power Options

Page 151: €¦ · 2 Table of Contents Introduction

151

Windows XP Control Panel Utilities

Windows Vista Control Panel Utilities

Windows 7 Control Panel Utilities

Demo - Exploring the Windows 7 Control Panel

Topic C: Command Line Tools

The Command Prompt

Operating System Command Line Tools

Networking Command Line Tools

The Recovery Console

WinRE

Topic D: Windows Operating System Tools

Types of User Accounts

User Account Control

Group Accounts

System Files and Folders

Windows Explorer

Computer/My Computer

File Extensions

Demo - Viewing File Extensions

File Attributes

Windows File System Types

Permissions

NTFS File Permissions

NTFS Folder Permissions

Demo - Exploring NTFS Permissions

Shared Files and Folders

Share Permissions

NTFS vs. Share Permissions

Permissions Considerations

User Authentication

Topic E: Windows Operating System Tools

Administrative Tools

Demo - Exploring Administrative Tools

Local Users and Groups

Device Manager

Demo - Using Computer Management and Device Manager

Task Manager

Demo - Using Task Manager

Disk Management

Migration Tools

Page 152: €¦ · 2 Table of Contents Introduction

152

The Registry

Registry Subtrees

Run Line Utilities

MSConfig

Demo - Exploring System Configuration Settings and Information

Lesson 02 Review

Lab: Operating System Fundamentals 4.5hrs

Lab: Configuring Windows Operating System Components 4.5hrs

Lesson 03 - PC Technician Professional Best Practices 5hrs

Topic A: Basic Maintenance Tools and Techniques

Types of Hardware Toolkits

Live Demo - Identifying Common Toolkit Components

Software Diagnostic Tools

Hard Drive Self-Tests

Software Diagnostic Tests

Computer Component Maintenance Techniques

Cleaning Compounds and Materials

Live Demo – Maintenance

Documentation and Resources

Compliance and Government Regulations

Topic B: Electrical Safety

Static Electricity

ESD

ESD Prevention Techniques

Live Demo – ESD

EMI

EMI Prevention Techniques

An ESD Toolkit

Electrical Hazards

Electrical Safety Precautions

Topic C: Environmental Safety and Materials Handling

Environmental Considerations and Controls

Workplace Safety Issues

Environmental Safety Best Practices

General Power Issues

Power Protection Systems

Liquid Hazards

Chemical Hazards

MSDS Documents

Incident Reports

Page 153: €¦ · 2 Table of Contents Introduction

153

Hazardous Material Disposal Procedures

Topic D: Professionalism and Communication

Communication Skills

AUP

Professional Conduct

Prohibited Content

Best Practices Related to Prohibited Content or Activity

Computer Forensics

Lesson 03 Review

Lesson 04 - Peripheral Components 5hrs

Topic A: Install and Configure Display Devices

Display Device Types

Display Device Settings and Features

Device Drivers

Display Device Selection Tips

Display Device Installation Considerations

Demo - Configuring Display Devices

Topic B: Install and Configure Input Devices

Standard Input Device Types

Biometric Input Device Types

Specialized Input Device Types

KVM Switches

Input Device Selection Tips

Input Device Installation Considerations

Demo - Configuring Input Devices

Topic C: Install and Configure Expansion Cards

Expansion Card Types

Card Selection Tips

Card Installation Considerations

Expansion Card Configuration

Topic D: Install and Configure Multimedia Devices

Multimedia Devices

Common Multimedia Devices

Multimedia Device Selection Tips

Multimedia Device Installation Considerations

Multimedia Device Configuration

Lesson 04 Review

Lab: Peripheral Components 4.5hrs

Lesson 05 - Managing System Components 5hrs

Topic A: Motherboards

Page 154: €¦ · 2 Table of Contents Introduction

154

Motherboard Sizes/Form Factors

Expansion Slots

RAM Slots

Integrated I/O Port Types

Chipsets

CMOS Battery

Live Demo - Replacing CMOS Battery

Jumpers and DIP Switches

Front Panel Connectors

Fan Connectors

Live Demo - Cooling Fins and a Fan

Live Demo - Processor Fan

Bus Speeds

Motherboard Power Connectors

Live Demo - Motherboard Power Connectors

Motherboard Selection Tips

Motherboard Installation Considerations

Live Demo – Motherboard

Topic B: CPUs and Cooling Systems

CPU Sockets

Intel CPU Socket Types

AMD CPU Socket Types

Cache

CPU Operational Characteristics

CPU Selection Factors

Cooling System Types

Cooling System Selection Factors

Live Demo - Cooling Method

Topic C: Select and Install Power Supplies

Power Supply Specifications

Power Supply Connections

Live Demo - Peripheral Power Connector

Power Supply Safety Recommendations

Selecting the Right Power Supply

Live Demo - Modern Power Supply

Live Demo - Legacy Power Supply

Topic D: RAM Types and Features

RAM Modules

Single-Sided and Double-Sided Memory

RAM Configurations

Page 155: €¦ · 2 Table of Contents Introduction

155

Types of RAM

ECC

Parity

RAM Characteristics

Topic E: Install and Configure Storage Devices

Media Capacity

RAID Standards

Common RAID Types

Internal Storage Device Considerations

External Storage Device Considerations

Demo - Installing an Internal Storage Device

Topic F: Configure the System BIOS

BIOS Memory

BIOS Components

Firmware Upgrades

BIOS Configuration Options

BIOS Diagnostics

BIOS Monitoring Capabilities

Lesson 05 Review

Lesson 06 - Installing and Configuring Operating Systems 5hrs

Topic A: Implement Virtualization

What is Virtualization?

Types of Virtualization

Components of a Virtual Environment

Virtual Desktop Infrastructure

Virtualization Requirements

Windows Client Virtualization Solutions

Demo - Creating a VM on Windows 7

Topic B: Install Microsoft Windows

Windows System Requirements

Hardware Compatibility

Boot Methods

Imaging

Installation Types

Third Party Drivers

Partitioning

Partitioning Types

Volumes

Partitioning and File System Types

Workgroups

Page 156: €¦ · 2 Table of Contents Introduction

156

Homegroups

Domains

Customizing System Options

Updates

Factory Recovery Partition

Microsoft Product Activation

Demo - Installing Microsoft Windows

Topic C: Windows Upgrades

In-Place Upgrades

Supported Upgrade Paths

Compatibility Tools

Topic D: Windows Preventive Maintenance

Data Backup and Restoration

Maintenance Tools

Scheduling Tasks

Patch Management

Managing Updates

Demo - Performing Preventive Maintenance

Lesson 06 Review

Lab: Installing and Configuring Operating Systems 4.5hrs

Lesson 07 - Customized Client Environments 5hrs

Topic A: Standard Clients

What is a Standard Client?

Client Requirements

Virtualization Workstation

Virtualization Workstation Requirements

Topic B: Custom Client Environments

Media Design Workstations

Media Design Workstation Requirements

Audio/Video Editing Workstations

Audio/Video Editing Hardware Requirements

Gaming PCs

Gaming PC Requirements

Home Theater PC

Home Theater PC Requirements

Home Server PC

Home Server Requirements

Lesson 07 Review

Lesson 08 - Networking Technologies 5hrs

Topic A: Physical Network Connections

Page 157: €¦ · 2 Table of Contents Introduction

157

Networks

Network Models

Network Interface Card Characteristics

Twisted Pair Cables

Types of Twisted Pair Cable

PVC Cable and Plenum Cabling

Twisted Pair Connectors

Coaxial Cables

Coaxial Cable and Connector Types

Live Demo - Coax and Coax Networks

Fiber Optic Cables

Fiber Optic Cable Types

Fiber Optic Connector Types

Wireless Connections

Additional Network Connection Methods

Topic B: TCP/IP

TCP/IP

IPv4 Addresses

Subnet Masks

Gateways

IP Address Classes

IPv6 Addresses

The IPv6 Address Format

IPv4 vs. IPv6

Addressing Schemes

Static vs. Dynamic Addressing

DHCP

DNS

Client-Side DNS

Demo - Identifying Your Computer's TCP/IP Information

Topic C: Network Connectivity

LANs

WANs

PANs

MANs

VPNs

Ethernet

Network Topologies

Network Device Types and Features

ISPs

Page 158: €¦ · 2 Table of Contents Introduction

158

Broadband Communications

Internet Connection Types and Features

Topic D: Ports and Protocols

Ports

TCP vs. UDP

Port Ranges

Common Ports

LDAP

SNMP

SSH

SFTP

SMB

Topic E: Set Up and Configure Windows Networking

Directory Services

Windows Networking Options

Demo - Joining a Computer to a Domain

Network Shares

Demo - Creating a Network Share

Network Connection Types

Proxy Settings

Remote Desktop

Network Location Settings

Firewall Settings

Alternative IP Address Configuration Methods

Network Card Properties

Live Demo - Network Cards and Cables

Topic F: Networking Tools

Cable Testers

Crimpers

Multimeter

Toner Probe

Loopback Plug

Punch Down Tool

Networking Utilities

Demo - Identifying Networking Tools

Lesson 08 Review

Lab: Networking Technologies 4.5hr

Lab: Multimeter and Cables 2.5hrs

Lesson 09 - Installing, Configuring, and Maintaining SOHO Networks 5hrs

Topic A: Install and Configure SOHO Networks

Page 159: €¦ · 2 Table of Contents Introduction

159

SOHO Networks

Firewalls and SOHO Networks

DMZs

NAT Implementations

WPS

Basic QoS

802.11 Wireless Standards

WAPs

SSID

Encryption

Wireless Encryption Types

Router Settings and Configurations

Live Demo - Configure Router

Topic B: SOHO Network Security

Common SOHO Security Methods

Wireless Security

SOHO Wireless Security Methods

Wireless Client Configuration Options

Lesson 09 Review

Lesson 10 - Supporting Laptops 5hrs

Topic A: Laptop Hardware and Components

Laptops

Laptop Hardware Components

Types of Laptop Displays

Laptop Display Components

Internal Laptop Components

Laptop Expansion Options

Special Function Keys

Laptop Docking Solutions

Laptop Locks

Laptop Power Supplies and Batteries

Demo - Power Options

Auto-Switching and Fixed Input Power Supplies

Laptop Cooling Considerations

Topic B: Install and Configure Laptop Hardware Components

General Laptop Support Guidelines

Live Demo - Inside of Laptop

Lesson 10 Review

Lesson 11 - Mobile Computing 5hrs

Page 160: €¦ · 2 Table of Contents Introduction

160

Topic A: Mobile Device Technologies

What is Mobile Technology?

Mobile Operating Systems

Smartphones

Tablet PCs

Tablets vs. Laptops

Mobile Device Features

Topic B: Configure Mobile Devices

Mobile Security

Mobile Device Security Techniques

Network Configuration Settings

Bluetooth Configuration Methods

The Bluetooth Pairing Process

Data Synchronization

Synchronization Requirements

Email Configuration Methods

Email Server and Configuration Settings

Lesson 11 Review

Lesson 12 - Supporting Printers 5hrs

Topic A: Printer Technologies

Printers

An MFD

Laser Printers

The Laser Print Process

Inkjet Printers

The Inkjet Print Process

Duplexing

Thermal Printers

Thermal Print Processes

Impact Printers

The Impact Print Process

Topic B: Install, Configure, and Maintain Printers

Technical Printer Components

Printer Supplies and Media

Printer Driver Types

Printer Driver Compatibility

Local and Network-Based Printers

Print Device Sharing

Printer Configuration Options

Printer Maintenance

Page 161: €¦ · 2 Table of Contents Introduction

161

Live Demo - Printers

Demo - Installing a Local Printer

Lesson 12 Review

Lab: Supporting Printers 2hr

Lesson 13 – Security 5hrs

Topic A: Security Fundamentals

Corporate Security Policies

Security Incident Reports

The Principle of Least Privilege

Strong Passwords

User Education

Common User Security Practices

Authentication Methods

Topic B: Security Threats and Vulnerabilities

Malware

Types of Malware

Social Engineering

Physical Security Threats and Vulnerabilities

Common Wireless Security Threats

Topic C: Security Protection Measures

Physical Security

Physical Security Measures

Digital Security

Antivirus Software

Anti-Spyware Software

Firewalls

Social Engineering Prevention Techniques

Hard Drive Sanitation

Formatting Hard Drives for Disposal

Physical Destruction Methods for Computer Media

Topic D: Workstation Security

Windows Security Policies

Windows Firewall

Software Firewall Configuration Settings

Workstation Security Best Practices

Demo - Securing a Workstation

Lesson 13 Review

Lab: Security 4.5hrs

Lab: Comparing Workgroup Security and Domain Security 4.5hrs

Lesson 14 - Troubleshooting Hardware Components 5hrs

Page 162: €¦ · 2 Table of Contents Introduction

162

Topic A: Troubleshooting Theory

Troubleshooting Theory

Troubleshooting Models

Troubleshooting Template Forms

Topic B: Troubleshoot Video and Display Devices

Common Video and Display Issues

Topic C: Troubleshoot Hard Drives and RAID Arrays

Drive and Array Troubleshooting Tools

Common Hard Drive Symptoms

Common RAID Array Issues

SATA Troubleshooting Tips

PATA Troubleshooting Tips

SCSI Troubleshooting Tips

Topic D: Troubleshoot System Components

Common System Troubleshooting Tools

Common CPU Issues

Common Cooling System Issues

Common Motherboard Issues

Repair vs. Replace

Common RAM Issues

Common External Power Source Problems

Common Power Supply Problems

Power Supply Troubleshooting Considerations

Topic E: Troubleshoot Laptops

Maintenance and Handling Techniques

Operating Environment Best Practices

General Laptop Issues

Common Laptop Keypad Issues

Common Wireless Connectivity Issues

Laptop Disassembly Best Practices

Topic F: Troubleshoot Printers

Common Printer Troubleshooting Tools

Printer Software Tools

Common Printer Symptoms

Lesson 14 Review

Lesson 15 - Troubleshooting System-Wide Issues 5hrs

Topic A: Troubleshoot Operating Systems

Operating System Troubleshooting Tools

BSOD

System Lockup Errors

Page 163: €¦ · 2 Table of Contents Introduction

163

Input/Output Device Issues

Application Errors

Boot Issues

Common Operating System Symptoms

Error and Warning Messages in Event Viewer

Registry Error Messages

Demo - Troubleshooting a Remote Computer with Remote Desktop

Topic B: Troubleshoot Wired and Wireless Networks

Common Network Issues

Network Troubleshooting Utilities

Network Troubleshooting Tools

Demo - Troubleshooting Network Issues

Topic C: Troubleshoot Common Security Issues

Common Security Issues

Malware Removal Process

Malware Removal Best Practices

Security Troubleshooting Tools

Lesson 15 Review

Course Closure

Lab: Troubleshooting System-Wide Issues 4.5hrs

Lab: Teardown and Re-build of PC 4.5hrs

COURSE TITLE: Network+ Networking Fundamentals

PREREQUISITE: None

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day

or evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to perform tasks such as:

Installation

Configuration

Diagnosing

Preventative maintenance

Basic networking

COURSE OBJECTIVES: CompTIA Network+ validates the ability to select, connect, configure and troubleshoot basic network hardware, including wireless technology. Employees, customers, and potential clients depend on their network. Employing those CompTIA Network+ certified help keep this

NH5200 Network + Networking

Fundamentals 104 Total Hours

66 Theory Hours

38 Laboratory Hours

Page 164: €¦ · 2 Table of Contents Introduction

164

vital part of business up and running. This course is intended for entry-level computer support professionals with basic knowledge of computer hardware, software, and operating systems, who wish to increase their knowledge and understanding of networking concepts and skills to prepare for a career in network support or administration, or to prepare for the CompTIA Network+ N10-005 certification.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Axzo Press (2012) CompTIA Network+ Certification, Exam N10-005 + CertBlaster, Student Manual, Axzo Press

Publishing

Networking Cable

Switch

Router

Virtual PC

2 – “A+ machines”

INSTRUCTIONAL STRATEGIES: This course combines theory instruction with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations.

COURSE OUTLINE:

Objective 1.1 - The OSI and TCP/IP Models 4hr

OSI Layer 7

OSI Layer 6

OSI Layer 5

OSI Layer 4

OSI Layer 3

OSI Layer 2

OSI Layer 1

LAN Compared with the OSI Model

TCP/IP Architecture

Demo - OSI Review

Objective 1.1 Review Lab: Compare TCP/IP to other protocols 2hr

Objective 1.2 - Applications, Devices, Protocols 4hr

Classifying Network Components

Objective 1.2 Review

Objective 1.3 - IP Addressing 4hr

MAC Address

IPv4

Classful IPv4 Addresses

Subnet Masks

Network IDs

Special Addresses

CIDR

CIDR Address

APIPA

IPv6

IPv6 Address Types

IPv6 Address Scopes

Page 165: €¦ · 2 Table of Contents Introduction

165

Demo - Convert Binary

IPv4 Subnet Masks

IPv4 Custom Subnets

IPv6 Subnets

IPv6 Custom Subnets

Default Gateway

Routing Example

IPCONFIG and IFCONFIG

Demo - Examining IP Settings

Objective 1.3 Review

Objective 1.4 - Routing and Switching 5hr

Internetworking Devices

Ethernet Hub

Repeaters

Repeater Placement

Wireless Repeater

Repeater Operation

Limitations of Repeaters

Bridges

Bridge Operation

Bridge Types

Bridge Routing Management

Bridge Filtering and Intelligence

Local and Remote Bridges

Layer 2 Switch

Configurations for Switched Networks

Switched Network with Bottlenecks

Switched Network without Bottlenecks

Benefits of Switches

Higher-level Switches

Managed Layer 3 Switch

Virtual LAN

VLAN Filtering

VLAN Trunking

Trunking Example

Demo - Intro to Routing and Switching VLANs

Routers

Router Operation

About Routers

Router Features

Key Points

Types of Routers

Routing Table Contents

Routing Metrics

Routing Examples

Page 166: €¦ · 2 Table of Contents Introduction

166

Brouters

Bridges vs. Routers

Objective 1.4 Review Lab: Examine Router and Switch Functions 4hr

Objective 1.5 - TCP and UDP Ports 1hr

Transport-layer Protocols

Port Addresses

Service Port Numbers

Demo - Port Numbers

Demo - netstat

Objective 1.5 Review

Objective 1.6 - Protocols 4hr

Network Communication Protocols

TCP

TCP Three-way Handshake

Internet Protocol (IP)

UDP

Protocols

Demo - Examining Ports and Protocols

Objective 1.6 Review

Objective 1.7 - The Domain Name System 1hr

DNS

Top-level Domains

DNS Namespace

DNS Records

Demo - Examining DNS

Objective 1.7 Review

Objective 1.8 - Troubleshooting Methodology 1hr

Troubleshooting

Hardware Toolkit

Additional Tools

Software Toolkit

Objective 1.8 Review

Objective 1.9 - Virtual Networks 1.5hr

Virtual Computers

Virtualization Concerns and Risks

Demo - Viewing VM Components

Cloud Computing

Cloud Deployment

Cloud Categories

Risks and Concerns

Objective 1.9 Review

Page 167: €¦ · 2 Table of Contents Introduction

167

Objective 2.1 - Installing and Configuring Routers and Switches 1.5hr

Installing Routers and Switches

Demo - Routing NAT

Objective 2.1 Review Lab: Troubleshoot Network Connectivity 3hr

Lab: Create a Virtual Network 4 hr

Lab: Connectivity Methods 4 hr

Objective 2.2 - Installing and Configuring Wireless Networks 1hr

The 802.11 Standard

The 802.11 Family

802.11 Networking

Configuration Options

Configuring Wireless Clients

RADIUS

Demo - Setting Up Wi-Fi

Objective 2.2 Review

Objective 2.3 – DHCP 1hr

Static IP Addressing

DHCP and DHCPv6

IPv4 Lease Process

IPv6 Lease Process

IPv6 Router Flags

M and O Flags

Demo - DHCP

Objective 2.3 Review.

Objective 2.4 - Troubleshooting Wireless Networks 2.5hr

Troubleshooting Connections

Common Problems

Objective 2.4 Review

Objective 2.5 - Troubleshooting Router and Switch Problems 2hr

Common Problems

Demo - Troubleshooting a Switch

Demo - Troubleshooting a Router

Objective 2.5 Review

Objective 2.6 - Planning and Implementing a SOHO Network 1hr

Purposes of a Plan

Creating a Plan

Ongoing Planning

Implementing a Plan

Network Cable

Objective 2.6 Review

Objective 3.1 - Standard Media Types 1.5hr

Page 168: €¦ · 2 Table of Contents Introduction

168

Fiber Optic Cable

Twisted-pair Cable

Common UTP Categories

Additional TP Categories

Stranded vs. Solid

Straight-through, Cross-over, Rollover

Pin Numbering of RJ-45 Connector

T1 Crossover Cable

Coaxial Cable

RG Standards

Plenums

Media Converters

Single-mode Fiber to UTP

Broadband Over Power Line

Access BPL

BPL Modem

Objective 3.1 Review

Objective 3.2 - Standard Connector Types 1hr

Fiber Optic Connectors

Fiber Optic Connector Types

Twisted-pair Connectors

Pin Numbering of RJ-45 Connector

Thinnet Connectors

Terminating Coax with BNC

RG-6 and RG-59 Connectors

Serial Connectors

Serial Cable

Serial Console Connections

Serial Cable Types

Serial Data Rates

Typical UTP Installation

Telecommunications Room

Termination Choices

Punchdown Block

Wire Placement

Objective 3.2 Review

Objective 3.3 - Wireless Standards 1.5hr

The 802.1x Standard

The 802.11 Standard

Access Point

Major Wireless Protocols

Device Compatibility

Channels

Channel Bonding

Page 169: €¦ · 2 Table of Contents Introduction

169

MIMO

Objective 3.3 Review

Objective 3.4 - WAN Technologies 4hr

Wide Area Networks

Packet vs. Circuit Switching

Demo - Packet Switching

WAN Connections

POTS/PSTN

ISDN

DSL

Cable

Satellite

Wireless

WiMAX

Cellular

T and E Lines

X.25 and Frame Relay

ATM

SONET and SDH

DWDM

PON

Objective 3.4 Review

Objective 3.5 - Network Topologies 2hr

Local Area Networks

Network Topologies

Logical Network Topologies

Peer-to-peer Model

Decentralized

Peer-to-peer Authentication

Client/Server Model

A Client/Server LAN

Client/Server Authentication

Star Topology

Bus Topology

Ring Topology

Mesh Topology

Hybrid Topology

Point-to-point vs. Point-to-multipoint

MPLS

Label Edge Routers

Demo - Topology

Objective 3.5 Review

Objective 3.6 - Troubleshooting Physical Connectivity .5hr

Troubleshooting Wired Connections

Page 170: €¦ · 2 Table of Contents Introduction

170

Cable Testing Devices

Physical Cable Tests

Objective 3.6 Review

Objective 3.7 - LAN Technologies 2hr

Ethernet

Ethernet Media

10-Gigabit Ethernet Standards

Gigabit Ethernet Standards

Fast Ethernet Standards

10BASE-T

Ethernet Bonding

Data Transmission

Data Collisions

Channel Access Methods

Demo - LAN Cable Types

Objective 3.7 Review

Objective 3.8 - Wiring Distribution Components 1hr

Network Access Points

Demo - Packet Tracing

Internet Service Providers (ISPs)

Small ISPs

Regional ISP

LAN Installation Components

Cross-connects

MDF to IDF Connections

Standards

Workstation Drops

Typical UTP Installation

Telecommunications Room

Objective 3.8 Review

Objective 4.1 - Network Appliances .5hr

Networking Appliances

Demo - The Purpose of Network Devices

Objective 4.1 Review

Objective 4.2 - Network Hardware Tools 2hr

Cable Testing Device

Physical Cable Tests

Network Function Tests

Cable Certifier

Additional Features

Testing a Basic Permanent Link

Crimpers

Coax Crimper

Page 171: €¦ · 2 Table of Contents Introduction

171

Twisted-pair Cable Crimper

Using a Fiber Optic Cable Crimper

Terminating Fiber Optic Cable

Butt Set

Butt Set Uses

Modapt Device

Toner Probe

Using a Toner Probe

Punchdown Tools

Using a Punchdown Tool

Network Analyzer

Loopback Plugs

TDR

OTDR

Multimeters

Measuring Resistance

Measuring Voltage

Measuring Current

Measuring Continuity

Environmental Monitor

ASHRAE 9.9 Guidelines

Objective 4.2 Review Lab: Create and Test Network Cable 3hr

Objective 4.3 - Network Software Tools 1.5hr

Network Analyzer

TCP/IP Utilities

IPConfig

Ifconfig

Ping (Packet Internet Groper)

Ping Troubleshooting

NSLookup and Tracert

Demo - Software Tools

Objective 4.3 Review Lab: TCP/IP Connectivity & Command Line Troubleshooting 2.5hr

Objective 4.4 - Monitoring Network Traffic 1hr

Performance Monitor

Performance Objects

Bottlenecks

Demo - Performance and Monitoring

Configuration

Event Viewer

Event Information

Event Types

Device and Application Logging

Syslog

Page 172: €¦ · 2 Table of Contents Introduction

172

Syslog Alert Levels

SNMP

Network Monitor

Demo - Network Monitoring

Objective 4.4 Review Lab: Capturing Network Traffic by Using Network Monitor 1.5hr

Lab: Performance Monitor 1hr

Objective 4.5 - Management Documentation .5hr

Change Management

Configuration Documentation

Objective 4.5 Review

Objective 4.6 - Optimizing Network Performance .5hr

Rationales

Methods

Objective 4.6 Review

Objective 5.1 - Implementing Wireless Security .5hr

Wireless Security

Transmission Encryption

Demo - Wireless Security

Objective 5.1 Review Lab: Configuring a Wireless Access Point 1.5hr

Objective 5.2 - Network Access Security Methods 2hr

Network Access Control

Access Control Lists

VPN Technologies

VPN Security Models

VPN Protocols

PPTP vs. L2TP

IPSec Protocols

IPSec Encryption

PPPoE

Remote Desktop Services

SSH

Demo - Network Security

Objective 5.2 Review Lab: Viewing the Event Logs 1.5hr

Objective 5.3 - User Authentication 3hr

AAA

Authentication Factors

One-factor Authentication

Two-factor Authentication

Three-factor Authentication

Single Sign-on

Page 173: €¦ · 2 Table of Contents Introduction

173

Kerberos

Kerberos System Components

Kerberos Data Types

Kerberos Authentication Process

CHAP

EAP

PPPoE

Mutual Authentication

Cryptography

ROT13 Cipher

Keys

Symmetric Encryption in Action

Public Key Cryptography

Asymmetric Encryption in Action

Demo - Encryption

Public Key Cryptography

Public Key Infrastructure

Setup and Initialization Phase

RADIUS

RADIUS Authentication

TACACS+

TACACS+ vs. RADIUS

802.1x

Objective 5.3 Review

Objective 5.4 - Network Security Threats 4hr

Topic A: Attacks and Threats

Wireless Security Threats

Vulnerabilities of Access Points

Wi-Fi Scanners

War Chalking Symbols

Denial-of-Service Attacks

Distributed DoS Attacks

DDoS Countermeasures

Man-in-the-Middle Attacks

Buffer Overflow

FTP Bounce Attacks

Smurf Attacks

Malware

Social Engineering

Attack Types

Social Engineering Countermeasures

Topic B: Mitigation

Antivirus Software

Securing the Operating System

Windows Update

Page 174: €¦ · 2 Table of Contents Introduction

174

Updates

Patch Management

Security Policies

Acceptable Use

Due Care

Privacy

Separation of Duties

Need to Know

Password Management

Account Expiration

Service-level Agreement

Disposal and Destruction

Human Resources Policies

Incident Response Policy

Preparation

Detection

Containment

Eradication

Recovery

Follow-up

Education

Communication

User Awareness

Demo - Vulnerability

Objective 5.4 Review

Objective 5.5 - Installing and Configuring a Firewall 1hr

Firewalls and Proxies

Firewall Categories

Security Zones

Intranet Zone

Perimeter Network

DMZ Options

Screened Host

Bastion Host

Three-homed Firewall

Back-to-back Firewalls

Dead Zone

Traffic Filtering

NAT and PAT

Port Address Translation

Firewall Administration

Rule Planning

Demo - Firewall Rules

Port Security

Objective 5.5 Review

Page 175: €¦ · 2 Table of Contents Introduction

175

Lab: Configuring Firewall Rules 1.5hr

Objective 5.6 - Network Security Appliances and Methods 1.5hr

Assessment Types

Vulnerability Assessments

Vulnerability Testing Tools

Demo - Scanning

Intrusion Detection

Events

NIDS

IDScenter for Snort

Example Snort Rule

HIDS

Advantages of HIDS over NIDS

Honeypots and Honeynets

Honeypot Examples

Honeypot Deployment

Objective 5.6 Review

Course Closure Lab: Create a Network 4hr

Lab: Join a Domain 2hr

Lab: Updating the Operating System 2.5hr

NH5300 CompTIA Security + 104 Total Hours

70 Theory Hours

34 Lab Hours

COURSE TITLE: CompTIA Security + PREREQUISITE: NH5000 or NH5200, or equivalent knowledge or experience

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After taking this course, students will understand the field of network security and how it

relates to other areas of information technology.

COURSE OBJECTIVES: This course provides the broad-based knowledge necessary to prepare for further study

in specialized security fields, or it can serve as a capstone course that gives a general introduction to network

security

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

CompTIA Security+ Certification, Exam SY0-301 +CertBlaster, Student Manual (2011) – Axzo Press

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assessments are given at the end of each module.

COURSE OUTLINE:

Unit 1: Mitigating threats 5hrs

Topic A: System maintenance

Topic B: Application security

Topic C: Physical security

Topic D: Malware

Page 176: €¦ · 2 Table of Contents Introduction

176

Topic E: Social engineering

Lab: Mitigating Threats 4hrs

Unit 2: Cryptography 5hrs

Topic A: Symmetric cryptography

Topic B: Public key cryptography

Lab: Cryptography 3hrs

Unit 3: Authentication 5hrs

Topic A: Authentication factors and requirements

Topic B: Authentication systems

Topic C: Authentication system vulnerabilities

Lab: Authentication 3hrs

Unit 4: User- and role-based security 5hrs

Topic A: Baseline security policies

Topic B: Resource access

Lab: User- and role-based security 3hrs

Unit 5: Peripheral security 5hrs

Topic A: File and disk encryption

Topic B: Peripheral and component security

Topic C: Mobile device security

Lab: Peripheral Security 3hrs

Unit 6: Public key infrastructure 5hrs

Topic A: Public key cryptography

Topic B: Implementing public key infrastructure

Topic C: Web server security with PKI

Lab: Public key infrastructure 3hrs

Unit 7: Application and messaging security 5hrs

Topic A: Application security

Topic B: E-mail security

Topic C: Social networking and messaging

Lab: Application and messaging security 3hrs

Unit 8: Ports and protocols 5hrs

Topic A: TCP/IP basics

Topic B: Protocol-based attacks

Lab: Ports and protocols 3hrs

Unit 9: Network security 5hrs

Topic A: Network devices

Topic B: Secure network topologies

Topic C: Secure networking

Topic D: Virtualization and cloud computing

Page 177: €¦ · 2 Table of Contents Introduction

177

Lab: Network Security 3hrs

Unit 10: Wireless security 5hrs

Topic A: Wireless network security

Topic B: Mobile device security

Unit 11: Remote access security 5hrs

Topic A: Remote access

Topic B: Virtual private networks

Lab: Remote Access Security 3hrs

Unit 12: Vulnerability testing and monitoring 5hrs

Topic A: Risk and vulnerability assessment

Topic B: Auditing and logging

Topic C: Intrusion detection and prevention systems

Topic D: Incident response

Lab: Vulnerability testing and monitoring 3hrs

Unit 13: Organizational security 5hrs

Topic A: Organizational policies

Topic B: Education and training

Topic C: Disposal and destruction

Unit 14: Business continuity 5hrs

Topic A: Business continuity planning

Topic B: Disaster recovery

Topic C: Environmental controls

NH62-9293

Installing, Managing &

Troubleshooting

Windows 7 Desktop and

Intro to Windows 8

104 Total Hours

73 Theory Hours

31 Lab Hours

COURSE TITLE: Installing, Managing & Troubleshooting Windows 7 Desktop and Intro to Windows 8

PREREQUISITE: None

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day

or evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Perform a clean installation of Windows 7, upgrade to Windows 7, and migrate user-related data and

settings from an earlier version of Windows.

Configure disks, partitions, volumes, and device drivers to enable a Windows 7 client computer.

Configure file access and printers on a Windows 7 client computer.

Configure network connectivity on a Windows 7 client computer.

Configure wireless network connectivity on a Windows 7 client computer.

Secure Windows 7 client desktop computers.

Optimize and maintain the performance and reliability of a Windows 7 client computer.

Page 178: €¦ · 2 Table of Contents Introduction

178

Configure mobile computing and remote access settings for a Windows 7 client computer.

Students will be exposed to various troubleshooting tools and techniques that enable them to address the

following Windows 7 issues in an enterprise network environment: Startup, Group Policy, Hardware and

device driver, performance, network connectivity, remote connectivity, user profile and logon, security, and

applications.

Navigate the Windows 8 User Interface including using modern applications, internet explorer, and security

features.

COURSE OBJECTIVES: This course is intended for IT professionals who are interested in expanding their

knowledge base and technical skills about Windows 7 Client. In this course, students learn how to install, upgrade,

and migrate to Windows 7 client. Students then configure Windows 7 client for network connectivity, security,

maintenance, and mobile computing. The goal of this training is to enable these individuals to support the Windows

7 operating system and solve technical troubleshooting problems in a Windows 7 and Windows Server 2008 R2

networking environment. This course also provides students with an introduction to personal computers using the

Microsoft Windows 8 operating system.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Microsoft Official Courseware (MOC) - Installing and Configuring Windows® 7 Client - Course 6292AC (Class

Pack) – Arvato Publishing

Microsoft Official Courseware (MOC) - Troubleshooting and Supporting Windows® 7 in the Enterprise - Course

6293AC (Class Pack) – Arvato Publishing

Logical Operations (2013): Using Windows 8. Logical Operations Publishing

Windows 7 Software

Windows 8 Software

Virtual PC

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations.

COURSE OUTLINE:

Module 1: Installing, Upgrading, and Migrating to Windows 7 4 hrs.

Preparing to Install Windows 7

Performing a Clean Installation of Windows 7

Upgrading and Migrating to Windows 7

Performing Image-based Installation of Windows 7

Configuring Application Compatibility

Lab: Installing and Configuring Windows 7 1.5hrs Module 2: Configuring Disks and Device Drivers 4 hrs.

Partitioning Disks in Windows 7

Managing Disk Volumes

Maintaining Disks in Windows 7

Installing and Configuring Device Drivers

Lab: Configuring Disks and Device Drivers 1.5 hrs.

Module 3: Configuring File Access and Printers on Windows® 7 Clients 4 hrs.

Overview of Authentication and Authorization

Managing File Access in Windows 7

Managing Shared Folders

Configuring File Compression

Managing Printing

Lab: Configuring File Access and Printers on Windows 7 Client Computers 1.5 hrs.

Page 179: €¦ · 2 Table of Contents Introduction

179

Module 4: Configuring Network Connectivity 4 hrs.

Configuring IPv4 Network Connectivity

Configuring IPv6 Network Connectivity

Implementing Automatic IP Address Allocation

Overview of Name Resolution

Troubleshooting Network Issues

Lab: Configuring Network Connectivity 1.5hrs.

Module 5: Configuring Wireless Network Connections 4 hrs

Overview of Wireless Networks

Configuring a Wireless Network

Lab: Configuring Wireless Network Connections 1.5hrs

Module 6: Securing Windows 7 Desktops 4 hrs

Overview of Security Management in Windows 7

Securing a Windows 7 Client Computer by Using Local Security Policy Settings

Securing Data by Using EFS and BitLocker

Configuring Application Restrictions

Configuring User Account Control

Configuring Windows Firewall

Configuring Security Settings in Internet Explorer 8

Configuring Windows Defender

Lab A: Configuring UAC, Local Security Policies, EFS, and AppLocker 1.5hrs

Lab B: Configuring Windows Firewall, Internet Explorer 8 Security Settings, and Windows Defender .

Module 7: Optimizing and Maintaining Windows 7 Client Computers 4 hrs.

Maintaining Performance by Using the Windows 7 Performance Tools Maintaining Reliability by Using the Windows 7 Diagnostic Tools

Backing Up and Restoring Data by Using Windows Backup

Restoring a Windows 7 System by Using System Restore Points

Configuring Windows Update

Lab: Optimizing and Maintaining Windows 7 Client Computers 1.5 hrs.

Module 8: Configuring Mobile Computing and Remote Access in Windows 7 4 hrs.

Configuring Mobile Computer and Device Settings

Configuring Remote Desktop and Remote Assistance for Remote Access

Configuring DirectAccess for Remote Access

Configuring BranchCache for Remote Access

Lab: Configuring Mobile Computing and Remote Access in Windows 7 1.5 hrs.

Module 9: Implementing a Troubleshooting Methodology 4hrs

Introduction to the EDST Job Role

Overview of Troubleshooting Steps

Module 10: Troubleshooting Startup Issues 4hrs

Overview of the Windows 7 Recovery Environment

Configuring and Troubleshooting Startup Settings

Troubleshooting Operating System Services Issues

Page 180: €¦ · 2 Table of Contents Introduction

180

Lab : Troubleshooting Startup Issues 1.5hrs

Module 11: Using Group Policy to Centralize Configuration 4hrs

Overview of Group Policy Application

Resolving Client Configuration Failures and GPO Application Issues

Lab : Using Group Policy to Centralize Configuration 1.5hrs

Module 12: Troubleshooting Hardware Device, Device Driver, and Performance Issues 4hrs

Overview of Hardware Troubleshooting

Troubleshooting Physical Failures

Monitoring Reliability and Performance

Configuring Performance Options in Windows 7

Troubleshooting Device Driver Failures

Lab : Lab A: Resolving Hardware Device and Device Driver Issues 1.5hrs

Lab : Lab B: Troubleshooting Performance-Related Issues 1.5hrs

Module 13: Troubleshooting Network Connectivity Issues 3hrs

Determining Network Settings

Troubleshooting Network Connectivity Issues

Lab : Troubleshooting Network Connectivity Issues 1.5hrs

Module 14: Troubleshooting Remote Connectivity Issues 4hr

Troubleshooting VPN Connectivity Issues

Using Remote Desktop

Troubleshooting User Issues by Using Remote Assistance

Troubleshooting NAP Issues

Troubleshooting DirectAccess Issues

Lab : Resolving Remote Connectivity Issues 1.5hrs

Module 15: Troubleshooting Logon and Resource Access Issues 3hrs

Troubleshooting User Logon Issues

Troubleshooting User Profile Issues

Troubleshooting File Access Issues

Troubleshooting File Permissions Issues

Troubleshooting Printer Access Issues

Lab : Troubleshooting Logon and Resource Access Issues 1.5hrs

Module 16: Troubleshooting Security Issues 3hrs

Recovering Files Encrypted by EFS

Recovering BitLocker-Protected Drives

Troubleshooting Internet Explorer and Content Access Issues

Lab : Troubleshooting Security Issues 1.5hrs

Module 17: Troubleshooting Operating System and Application Issues 4hrs

Page 181: €¦ · 2 Table of Contents Introduction

181

Troubleshooting Application Installation Issues

Troubleshooting Application Operations Issues

Applying Application and Windows Updates

Lab : Troubleshooting Operating System and Application Issues 1.5hrs

Module 18: Getting to Know PCs and the Windows 8 User Interface 1hr

Identify Components of a Personal Computer

Sign In to Windows 8

Navigate the Start Screen

Lab: Getting to Know PCs and the Windows 8 User Interface 1hr

Module 19: Using Modern Apps and Navigation Features 1hr

Access and Identify the Charms

Modern Apps and Common Navigation Features

Multitasking with Apps

Lab: Using Modern Apps and Navigation Features 1hr

Module 20: Working with Desktop Applications 2hrs

Navigate the Desktop

Manage Files and Folders with File Explorer

Elements of a Desktop Window

Lab: Working with Desktop Applications .5hr

Module 21: Using Internet Explorer 10 2hrs

Navigate Internet Explorer 10

Browse the Web

Lab: Using Internet Explorer 10 .5hr

Module 22: Customizing the Windows 8 Environment 1hr

Customize the Start Screen

Customize the Desktop

Lab: Customizing the Windows 8 Environment 1hr

Module 23: Using Windows 8 Security Features 1hr

Set Privacy Levels and Passwords

Use Windows Defender

Store and Share Files with SkyDrive

Lab: Using Windows 8 Security Features .5hr

Lab: Using Windows 8 1hr

Page 182: €¦ · 2 Table of Contents Introduction

182

NH203-4142

Exchange Core and Advanced Solutions Exchange 2013

136 Total Hours

80 Theory Hours

56 Lab Hours

COURSE TITLE: Exchange Core and Advanced Solutions Exchange 2013 PREREQUISITE: Knowledge or experience including Windows Server 2008 R2 or Windows Server 2012,

and Active Directory and DNS.

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 136 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Plan and perform deployment and management of Microsoft Exchange Server 2013.

Plan a Mailbox server deployment and configure the Mailbox server role.

Create and manage various recipient objects in Exchange Server 2013.

Plan and deploy Client Access servers.

Plan and configure client connectivity to Exchange Server 2013 Client Access server.

Plan and configure message transport.

Plan and implement high availability.

Plan and implement disaster recovery for Exchange Server 2013.

Plan and configure message security options.

Plan and configure administrative security and administrative auditing.

Monitor and troubleshoot Exchange Server 2013.

Design and implement Exchange Server 2013 Unified Messaging.

Design and implement site resiliency for Exchange Server 2013.

Plan a virtualization strategy for Exchange Server 2013 roles.

Design and implement message transport security.

Design and implement message retention in Exchange Server 2013.

Design and implement messaging compliance.

Design and implement administrative security in an Exchange Server 2013 environment.

Use Windows PowerShell 3.0 to manage Exchange Server 2013.

Design and implement integration with Exchange Online.

Design and implement messaging coexistence.

Design and implement Exchange Server migrations from non-Exchange messaging systems, and

upgrades from previous Exchange Server versions.

COURSE OBJECTIVES: In this course, students will learn to configure and manage a Microsoft Exchange

Server 2013 messaging environment. This course will teach students guidelines, best practices, and considerations

that will help them optimize their Exchange server deployment. This will provide you with the knowledge and skills

to plan, install, and manage the mailbox role, client access, transport, and Exchange infrastructure.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2013): Core Solutions of Microsoft Exchange Server 2013 - Microsoft Publishing

Arvato Bertelsmann (2013): Advanced Solutions of Microsoft Exchange Server 2013 - Microsoft Publishing

Microsoft Server 2012 Software

Page 183: €¦ · 2 Table of Contents Introduction

183

Virtual PC

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Module 1: Deploying and Managing Exchange Server 2013 3.5hrs

Server 2013 Prerequisites and Requirements

Exchange Server 2013 Deployment

Managing Exchange Server 2013

Lab : Deploying and Managing Exchange Server 2013 2.5hrs

Module 2: Planning and Configuring Mailbox Servers 3.5hrs

Overview of the Mailbox Server Role

Planning the Mailbox Server Deployment

Configuring Mailbox Servers

Lab : Configuring Mailbox Servers 2.5hrs

Module 3: Managing Recipient Objects 3hrs

Managing Exchange Server 2013 Recipients

Managing Exchange Recipients

Managing Address Lists and Policies on Mailbox Server Role

Lab : Managing Exchange Recipient Objects 1hr

Module 4: Planning and Deploying Client Access Servers 3.5hrs

Planning Client Access Server Deployment

Configuring the Client Access Server Role

Managing Client Access Services

Lab : Deploying and Configuring Client Access Server Role 2.5hrs

Module 5: Planning and Configuring Messaging Client Connectivity 3.5hrs

Client Connectivity to Client Access Server

Configuring Outlook Web App

Planning and Configuring Mobile Messaging

Configuring Secure Internet Access for Client Access Server

Configuring Secure Internet Access for Client Access Server

Lab : Planning and Configuring Messaging Client Connectivity 2.5hrs

Module 6: Planning and Configuring Message Transport 3.5hrs

Overview of Message Transport

Planning and Configuring Message Transport

Managing Transport Rules

Lab : Planning and Configuring Message Transport 2.5hrs

Module 7: Planning and Implementing High Availability 3.5hrs

High Availability on Exchange Server 2013

Configuring Highly Available Mailbox Databases

Configuring Highly Available Client Access Servers

Page 184: €¦ · 2 Table of Contents Introduction

184

Lab : Implementing High Availability 2.5hrs

Module 8: Planning and Implementing Disaster Recovery 3.5hrs

Planning for Disaster Mitigation

Planning and Implementing Exchange Server 2013 Backup

Planning and Implementing Exchange Server 2013 Recovery

Lab : Implementing Disaster Recovery for Exchange Server 2013 2.5hrs

Module 9: Planning and Configuring Message Security Options 3.5hrs

Planning Messaging Security

Implementing an Antivirus Solution for Exchange Server 2013

Implementing an Antispam Solution for Exchange Server 2013

Lab : Planning and Configuring Message Security 2.5hrs

Module 10: Planning and Configuring Administrative Security and Auditing 3.5hrs

Configuring Role-Based Access Control

Configuring Audit Logging

Lab : Configuring Administrative Security and Auditing 2.5hrs

Module 11: Monitoring and Troubleshooting Exchange Server 2013 3.5hrs

Monitoring Exchange Server 2013

Maintaining Exchange Server 2013

Troubleshooting Exchange Server 2013

Lab : Monitoring and Troubleshooting Exchange Server 2013 2.5hrs

Module 12: Overview of Exchange Server 2013 Unified Messaging 3.5hrs

Telephony technologies overview

Unified Messaging in Exchange Server 2013

Unified Messaging components

Lab : Unified Messaging Overview 2.5hrs

Module 13: Designing and implementing Exchange Server 2013 Unified Messaging 3.5hrs

Designing a Unified Messaging deployment

Deploying and configuring Unified Messaging components

Integrating Exchange Server 2013 Unified Messaging with Lync

Lab : Designing and Implementing Exchange Server 2013 Unified Messaging 2.5hrs

Module 14: Designing and implementing site resiliency 3.5hrs

Site resiliency in Exchange Server 2013

Planning a site resilient implementation

Implementing site resiliency

Lab : Designing and implementing site resiliency 2.5hrs

Module 15: Planning virtualization for Exchange Server 2013 3.5hrs

Hyper-V 3.0 overview

Virtualizing Exchange Server 2013 server roles

Lab : Planning virtualization of Exchange Server roles 2.5hrs

Module 16: Designing and implementing message transport security 3.5hrs

Page 185: €¦ · 2 Table of Contents Introduction

185

Overview of policy and compliance requirements

Designing and implementing transport compliance

Designing and implementing AD RMS integration with Exchange Server 2013

Lab : Designing and implementing message transport security 2.5hrs

Module 17: Designing and implementing message retention 3.5hrs

Message records management and archiving overview

Designing in-place archiving

Designing and implementing message retention

Lab : Designing and implementing message retention 2.5hrs

Module 18: Designing and implementing messaging compliance 3.5hrs

Designing and implementing an in-place hold

Designing and implementing in-place e-discovery

Lab : Designing and implementing messaging compliance 2.5hrs

Module 19: Designing and implementing administrative security and auditing 3.5hrs

Designing and implementing role based access control

Designing and implementing split permissions

Planning and implementing audit logging

Lab : Designing and implementing administrative security and auditing 2.5hrs

Module 20: Managing Exchange Server 2013 with Exchange Management Shell 3.5hrs

Overview of Windows PowerShell 3.0

Using Exchange Management Shell to manage Exchange Server recipients

Managing Exchange Server 2013 with Exchange Management Shell

Lab : Managing Exchange Server 2013 with Exchange Management Shell 2.5hrs

Module 21: Designing and implementing integration with Exchange Online 3.5hrs

Planning for Exchange Online

Planning and implementing the migration to Exchange Online

Planning coexistence with Exchange Online

Lab : Designing integration with Exchange Online 2.5hrs

Module 22: Designing and implementing messaging coexistence 3.5hrs

Designing and implementing federation

Designing coexistence between Exchange organizations

Designing and implementing cross-forest mailbox moves

Lab : Implementing messaging coexistence 2.5hrs

Module 23: Designing and implementing Exchange Server migrations and upgrades 3.5hrs

Designing migration from non-Exchange email systems

Planning the upgrade from previous Exchange versions

Implementing the migration from previous Exchange versions

Lab : Designing and implementing Exchange Server migrations 2.5hrs

Page 186: €¦ · 2 Table of Contents Introduction

186

NH20331

SharePoint: Core Solutions of Microsoft SharePoint Server 2013

104 Total Hours

56 Theory Hours

48 Lab hours

COURSE TITLE: SharePoint: Core Solutions of Microsoft SharePoint Server 2013 PREREQUISITE: Previous SharePoint experience, including knowledge of the differences between

SharePoint 2007 and 2010, or equivalent knowledge and skills.

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Describe the key features of SharePoint 2013

Design an information architecture

Design logical and physical architectures

Install and configure SharePoint Server 2013

Create web applications and site collections

Plan and configure service applications

Manage users and permissions

Configure authentication for SharePoint 2013

Secure a SharePoint 2013 deployment

Manage taxonomy

Configure user profiles

Configure enterprise search

Monitor and maintain a SharePoint 2013 environment

COURSE OBJECTIVES: This course will provide you with the knowledge and skills to configure and manage a

Microsoft SharePoint Server 2013 environment. This course will teach you how to configure SharePoint Server

2013, as well as provide guidelines, best practices, and considerations that will help you optimize your SharePoint

server deployment. Microsoft SharePoint Server 2013 is a document storage and collaboration platform that offers

many benefits to organizations. SharePoint deployments may take many different forms in scope, where a

deployment may be focused on only delivering one feature, such as enterprise search, or many features, such as

document management, business intelligence, web content management, and workflows. Deployments can also

differ greatly in size, with small deployments of a single server up to large deployments with farms of 15 or more

servers.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2013): Core Solutions of Microsoft® SharePoint® Server 2013 - Microsoft Publishing

Server 2012 Software

Virtual PC

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Module 1: Introducing SharePoint Server 2013 4hrs

Key Components of a SharePoint Deployment

New Features in SharePoint 2013

SharePoint 2013 Deployment Options

Page 187: €¦ · 2 Table of Contents Introduction

187

Module 2: Designing an Information Architecture 4hrs

Identifying Business Requirements

Understanding Business Requirements

Organizing Information in SharePoint 2013

Planning for Discoverability

Lab : Creating an Information Architecture - Part One 2hrs

Lab : Creating an Information Architecture - Part Two 2hrs

Module 3: Designing a Logical Architecture 4hrs

Overview of SharePoint 2013 Logical Architecture

Documenting Your Logical Architecture

Lab : Designing a Logical Architecture 2hrs

Module 4: Designing a Physical Architecture 4hrs

Designing Physical Components for SharePoint Deployments

Designing Supporting Components for SharePoint Deployments

SharePoint Farm Topologies

Mapping a Logical Architecture Design to a Physical Architecture Design

Lab : Designing a Physical Architecture 2hrs

Module 5: Installing and Configuring SharePoint Server 2013 4hrs

Installing SharePoint Server 2013

Scripting Installation and Configuration

Configuring SharePoint Server 2013 Farm Settings

Lab : Deploying and Configuring SharePoint Server 2013 - Part One 2hrs

Lab : Configuring SharePoint Server 2013 Farm Settings 2hrs

Module 6: Creating Web Applications and Site Collections 4hrs

Creating Web Applications

Configuring Web Applications

Creating and Configuring Site Collections

Lab : Creating and Configuring Web Applications 2hrs

Lab : Creating and Configuring Site Collections 2hrs

Module 7: Planning and Configuring Service Applications 4hrs

Introduction to Service Application Architecture

Creating and Configuring Service Applications Lab : Planning and Configuring Service Applications 2hrs

Module 8: Managing Users and Permissions 4hrs

Authorization in SharePoint 2013

Managing Access to Content Lab : Managing Users and Groups 2hrs

Lab : Securing Content in SharePoint Sites 2hrs

Module 9: Configuring Authentication for SharePoint 2013 4hrs

Overview of Authentication

Configuring Federated Authentication

Page 188: €¦ · 2 Table of Contents Introduction

188

Configuring Server-to-Server Authentication

Lab : Configuring SharePoint 2013 to Use Federated Identities 2hrs

Module 10: Securing a SharePoint 2013 Deployment 4hrs

Securing the Platform

Configuring Farm-Level Security

Lab : Hardening a SharePoint 2013 Server Farm 2hrs

Lab : Configuring Farm-Level Security 2hrs

Module 11: Managing Taxonomy 4hrs

Managing Content Types

Understanding Term Stores and Term Sets

Managing Term Stores and Term Sets

Lab : Configuring Content Type Propagation 2hrs

Lab : Configuring and Using Managed Metadata Term Sets 2hrs

Module 12: Configuring User Profiles 4hrs

Configuring the User Profile Service Application

Managing User Profiles and Audiences

Lab : Configuring User Profiles 4hrs

Lab : Configuring My Sites and Audiences 2hrs

Module 13: Configuring Enterprise Search 4hrs

Understanding the Search Service Architecture

Configuring Enterprise Search

Managing Enterprise Search

Lab : Configuring Enterprise Search 4hrs

Lab : Configuring the Search Experience 2hrs

Module 14: Monitoring and Maintaining a SharePoint 2013 Environment 4hrs

Monitoring a SharePoint 2013 Environment

Tuning and Optimizing a SharePoint Environment

Planning and Configuring Caching

Troubleshooting a SharePoint 2013 Environment

Lab : Monitoring a SharePoint 2013 Deployment 2hrs

Lab : Investigating Page Load Times 2hrs

NH107-7475

SQL: Querying and Administering SQL Server 2012

136 Total Hours

97 Theory Hours

39 Lab Hours

COURSE TITLE: SQL: Querying and Administering SQL Server 2012 PREREQUISITE: Before attending this course, students should have: A working knowledge of relational

databases and basic knowledge of the Microsoft Windows operating system and its core functionality.

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

Page 189: €¦ · 2 Table of Contents Introduction

189

COURSE LENGTH: 136 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Write SELECT queries

Query multiple tables

Use built-in functions

Use subqueries

Execute stored procedures

Use set operators

Implement error handling

Implement transactions

Use table expressions

Sort and filter data

Use window ranking, offset and aggregate functions

Query SQL Server metadata

Program with T-SQL

Improve query performance

Plan and install SQL Server.

Describes the system databases, the physical structure of databases and the most common

configuration options related to them.

Explain the concept of the transaction log and SQL Server recovery models and implement

different backup strategies available with SQL Server.

Create SQL Server Backups.

Restore SQL Server databases.

Use the import/export wizards and explain how they relate to SSIS.

Work with SQL Server security models, logins and users.

Work with fixed server roles, user-defined server roles, fixed database roles and user-defined

database roles.

Work with permissions and the assignment of permissions.

Work with SQL Server Audit.

Work with SQL Server Agent, jobs and job history.

Implement SQL Server agent security, proxy accounts and credentials.

Configure database mail, alerts and notifications.

Create database maintenance plans.

Work with SQL Profiler and SQL Trace stored procedures.

Introduce DMVs and the configuration of data collection.

Work with Central Management Servers and Multi-Server queries, Virtualization of SQL Server

and Data-Tier Applications.

Troubleshoot SQL Server databases.

COURSE OBJECTIVES: This course provides students with the technical skills required to write basic Transact-

SQL queries for Microsoft SQL Server 2012. This course is the foundation for all SQL Server-related disciplines;

namely, Database Administration, Database Development and Business Intelligence. This course provides students

Page 190: €¦ · 2 Table of Contents Introduction

190

with the knowledge and skills to maintain a Microsoft SQL Server 2012 database. The course focuses on teaching

individuals how to use SQL Server 2012 product features and tools related to maintaining a database.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2012): Querying Microsoft® SQL Server® 2012 - Microsoft Publishing

Arvato Bertelsmann (2012): Administering Microsoft® SQL Server® 2012 Databases- Microsoft Publishing

Microsoft Server 2012 Software

Virtual PC

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Module 1: Introduction to Microsoft SQL Server 2012 2.5hrs

Introducing Microsoft SQL Server 2012

Getting Started with SQL Server Management Studio

Lab : Working with SQL Server 2012 Tools 1hr

Module 2: Getting Started with SQL Azure 2.5hrs

Overview of SQL Azure

Working with SQL Azure

Module 3: Introduction to T-SQL Querying 2.5hrs

Introducing T-SQL

Understanding Sets

Understanding Predicate Logic

Understanding the Logical Order of Operations in SELECT statements

Lab : Introduction to Transact-SQL Querying 1hr

Module 4: Writing SELECT Queries 2.5hrs

Writing Simple SELECT Statements

Eliminating Duplicates with DISTINCT

Using Column and Table Aliases

Writing Simple CASE Expressions

Lab : Writing Basic SELECT Statements 1hr

Module 5: Querying Multiple Tables 2.5hrs

Understanding Joins

Querying with Inner Joins

Querying with Outer Joins

Querying with Cross Joins and Self Joins

Lab : Querying Multiple Tables 1hr

Module 6: Sorting and Filtering Data 2.5hrs

Sorting Data

Filtering Data with a WHERE Clause

Filtering with the TOP and OFFSET-FETCH Options

Working with Unknown and Missing Values

Lab : Sorting and Filtering Data 1hr

Page 191: €¦ · 2 Table of Contents Introduction

191

Module 7: Working with SQL Server 2012 Data Types 2.5hrs

Introducing SQL Server 2012 Data Types

Working with Character Data

Working with Date and Time Data

Lab : Working with SQL Server 2012 Data Types 1hr

Module 8: Using Built-In Functions 2.5hrs

Using Conversion Functions

Using Logical Functions

Using Functions to Work with NULL

Lab : Using Built-In Functions 1hr

Module 9: Grouping and Aggregating Data 2.5hrs

Using Aggregate Functions

Using the GROUP BY Clause

Filtering Groups with HAVING

Lab : Grouping and Aggregating Data 1hr

Module 10: Using Subqueries 2.5hrs

Writing Self-Contained Subqueries

Writing Correlated Subqueries

Using the EXISTS Predicate with Subqueries

Lab : Using Subqueries 1hr

Module 11: Using Table Expressions 2.5hrs

Using Derived Tables

Using Common Table Expressions

Using Views

Using Inline Table-Valued Functions

Lab : Using Table Expressions 1hr

Module 12: Using Set Operators 2.5hrs

Writing Queries with the UNION Operator

Using EXCEPT and INTERSECT

Using APPLY

Lab : Using Set Operators 1hr

Module 13: Using Window Ranking, Offset and Aggregate Functions 2.5hrs

Creating Windows with OVER

Exploring Window Functions

Lab : Using Window Ranking, Offset and Aggregate Functions 1hrs

Module 14: Pivoting and Grouping Sets 2.5hrs

Writing Queries with PIVOT and UNPIVOT

Working with Grouping Sets

Lab : Pivoting and Grouping Sets 1hrs

Module 15: Querying SQL Server Metadata 2.5hrs

Page 192: €¦ · 2 Table of Contents Introduction

192

Querying System Catalog Views and Functions

Executing System Stored Procedures

Querying Dynamic Management Objects

Lab : Querying SQL Server Metadata 1hr

Module 16: Executing Stored Procedures 2.5hrs

Querying Data with Stored Procedures

Passing Parameters to Stored Procedures

Creating Simple Stored Procedures

Working with Dynamic SQL

Lab : Executing Stored Procedures 1hr

Module 17: Programming with T-SQL 2.5hrs

T-SQL Programming Elements

Controlling Program Flow

Lab : Programming with T-SQL 1hr

Module 18: Implementing Error Handling 2.5hrs

Using TRY / CATCH Blocks

Working with Error Information

Lab : Implementing Error Handling 1hr

Module 19: Implementing Transactions 2.5hrs

Transactions and the Database Engine

Controlling Transactions

Lab : Implementing Transactions 1hr

Module 20: Improving Query Performance 2.5hrs

Factors in Query Performance

Displaying Query Performance Data

Lab : Improving Query Performance 1hr

Module 21: Introduction to SQL Server 2012 and its Toolset 2.5hrs

Introduction to the SQL Server Platform

Working with SQL Server Tools

Configuring SQL Server Services

Lab : Introduction to SQL Server and its Toolset 1hrs

Module 22: Preparing Systems for SQL Server 2012 2.5hrs

Overview of SQL Server Architecture

Planning Server Resource Requirements

Pre-installation Testing for SQL Server

Lab : Preparing Systems for SQL Server 1hr

Module 23: Installing and Configuring SQL Server 2012 2.5hrs

Preparing to Install SQL Server

Installing SQL Server

Upgrading and Automating Installation

Page 193: €¦ · 2 Table of Contents Introduction

193

Lab : Installing and Configuring SQL Server 1hr

Module 24: Working with Databases 2.5hrs

Overview of SQL Server Databases

Working with Files and Filegroups

Moving Database Files

Lab : Working with Databases 1hr

Module 25: Understanding SQL Server 2012 Recovery Models 2.5hrs

Backup Strategies

Understanding SQL Server Transaction Logging

Planning a SQL Server Backup Strategy

Lab : Understanding SQL Server Recovery Models 1hr

Module 26: Backup of SQL Server 2012 Databases 2.5hrs

Backing up Databases and Transaction Logs

Managing Database Backups

Working with Backup Options

Lab : Backup of SQL Server Databases 1hr

Module 27: Restoring SQL Server 2012 Databases 2.5hrs

Understanding the Restore Process

Restoring Databases

Working with Point-in-time recovery

Restoring System Databases and Individual Files

Lab : Restoring SQL Server 2012 Databases 1hr

Module 28: Importing and Exporting Data 2.5hrs

Transferring Data To/From SQL Server

Importing and Exporting Table Data

Inserting Data in Bulk

Lab : Importing and Exporting Data 1hr

Module 29: Authenticating and Authorizing Users 2.5hrs

Authenticating Connections to SQL Server

Authorizing Logins to Access Databases

Authorization Across Servers

Lab : Authenticating and Authorizing Users 1hr

Module 30: Assigning Server and Database Roles 2.5hrs

Working with Server Roles

Working with Fixed Database Roles

Creating User-defined Database Roles

Lab : Assigning Server and Database Roles 1hr

Module 31: Authorizing Users to Access Resources 2.5hrs

Authorizing User Access to Objects

Authorizing Users to Execute Code

Page 194: €¦ · 2 Table of Contents Introduction

194

Configuring Permissions at the Schema Level

Lab : Authorizing Users to Access Resources 1hr

Module 32: Auditing SQL Server Environments 2.5hrs

Options for Auditing Data Access in SQL

Implementing SQL Server Audit

Managing SQL Server Audit

Lab : Auditing SQL Server Environments 1hr

Module 33: Automating SQL Server 2012 Management 2.5hrs

Automating SQL Server Management

Working with SQL Server Agent

Managing SQL Server Agent Jobs

Lab : Automating SQL Server Management 1hr

Module 34: Configuring Security for SQL Server Agent 2.5hrs

Understanding SQL Server Agent Security

Configuring Credentials

Configuring Proxy Accounts

Lab : Configuring Security for SQL Server Agent 1hr

Module 35: Monitoring SQL Server 2012 with Alerts and Notifications 2.5hrs

Configuration of Database Mail

Monitoring SQL Server Errors

Configuring Operators, Alerts and Notifications

Lab : Monitoring SQL Agent Jobs with Alerts and Notifications 1hr

Module 36: Performing Ongoing Database Maintenance 2.5hrs

Ensuring Database Integrity

Maintaining Indexes

Automating Routine Database Maintenance

Lab : Performing Ongoing Database Maintenance 1hr

Module 37: Tracing Access to SQL Server 2012 2.5hrs

Capturing Activity using SQL Server Profiler

Improving Performance with the Database Engine Tuning Advisor

Working with Tracing Options

Lab : Tracing Access to SQL Server 2012 1hr

Module 38: Monitoring SQL Server 2012 1hr

Monitoring Activity

Capturing and Managing Performance Data

Analyzing Collected Performance Data

Lab : Monitoring SQL Server 2012 1hr

Module 39: Managing Multiple Servers 2.5hrs

Working with Multiple Servers

Virtualizing SQL Server

Page 195: €¦ · 2 Table of Contents Introduction

195

Deploying and Upgrading Data-Tier Applications

Lab : Managing Multiple Servers 1hr

Module 40: Troubleshooting Common SQL Server 2012 Administrative Issues 1hr

SQL Server Troubleshooting Methodology

Resolving Service-related Issues

Resolving Concurrency Issues

Resolving Login and Connectivity Issues

Lab : Troubleshooting Common Issues 1hr

NH20417

Upgrading Server 2008 to MCSA Windows Server 2012

104 Total Hours

60 Theory Hours

44 Lab Hours

COURSE TITLE: Upgrading Server 2008 to MCSA Windows Server 2012 PREREQUISITE: Previous experience or knowledge of Windows Server 2008

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Install and configure Windows Server 2012.

Monitor and maintain Windows Server 2012.

Manage Windows Server with Windows PowerShell 3.0.

Manage storage for Windows Server 2012 servers.

Implement network services.

Implement Remote Access.

Implement Failover Clustering.

Implement Hyper-V.

Implement Failover Clustering with Hyper-V.

Implement Dynamic Access Control.

Implement Active Directory Domain Services (AD DS).

Plan and implement AD FS.

COURSE OBJECTIVES: This course is designed primarily for people who want to upgrade their technical skills

from Windows Server 2008 and Windows Server 2008 R2 to Windows Server 2012. This course explains new

features and functionality in Windows Server 2012 around management, networking infrastructure, storage, access

control, Hyper-V, high availability, and identity federation. Specific technologies covered will include Dynamic

Access Control (DAC), Failover Clustering, Microsoft Online Backup and changes with Active Directory, and

Hyper-V and Active Directory Federation Services (ADFS).

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2012): Upgrading Your Skills to MCSA Windows Server® 2012 – Microsoft Publishing

Microsoft Server 2012 Software

Page 196: €¦ · 2 Table of Contents Introduction

196

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations. Multiple

choice assess

COURSE OUTLINE:

Module 1: Installing and Configuring Windows Server 2012 5hrs

Installing Windows Server 2012

Configuring Windows Server 2012

Configuring Remote Management for Windows Server 2012 Servers

Lab : Installing and Configuring Windows Server 2012 Servers 2hrs

Module 2: Monitoring and Maintaining Windows Server 2012 5hrs

Monitoring Windows Server 2012

Implementing Windows Server Backup

Implementing Server and Data Recovery

Lab : Monitoring and Maintaining Windows 2012 Servers 3.5hrs

Module 3: Managing Windows Server 2012 by Using Windows PowerShell 3.0 5hrs

Overview of Windows PowerShell 3.0

Using Windows PowerShell 3.0 to Manage AD DS

Managing Servers by Using Windows PowerShell 3.0

Lab : Managing Servers Running Windows Server 2012 by Using Windows PowerShell 3.0 3.5hrs

Module 4: Managing Storage for Windows Server 2012 5hrs

New Features in Windows Server 2012 Storage

Configuring iSCSI Storage

Configuring Storage Spaces in Windows Server 2012

Configuring BranchCache in Windows Server 2012

Lab : Managing Storage for Servers Based on Windows Server 2012 3.5hrs

Lab : Implementing BranchCache 3.5hrs

Module 5: Implementing Network Services 5hrs

Implementing DNS and DHCP Enhancements

Implementing IP Address Management

NAP Overview

Implementing NAP

Lab : Implementing Network Services 3.5hrs

Module 6: Implementing Remote Access 5hrs

Overview of VPN Access

Overview of DirectAccess

Installing and Configuring DirectAccess Components

Lab : Implementing DirectAccess 3.5hrs

Module 7: Implementing Failover Clustering 5hrs

Overview of Failover Clustering

Implementing a Failover Cluster

Configuring Highly-Available Applications and Services on a Failover Cluster

Page 197: €¦ · 2 Table of Contents Introduction

197

Maintaining a Failover Cluster

Implementing a Multisite Failover Cluster

Lab : Implementing Failover Clustering 3.5hrs

Module 8: Implementing Hyper-V 5hrs

Configuring Hyper-V Servers

Configuring Hyper-V Storage

Configuring Hyper-V Networking

Configuring Hyper-V Virtual Machines

Lab : Implementing Server Virtualization with Hyper-V 3.5hrs

Module 9: Implementing Failover Clustering with Hyper-V 5hrs

Overview of the Integration of Hyper-V Server 2012 with Failover Clustering

Implementing Hyper-V Virtual Machines on Failover Clusters

Implementing Windows Server 2012 Hyper-V Virtual Machine Movement

Managing Hyper-V Virtual Environments by Using Virtual Machine Manager

Lab : Implementing Failover Clustering with Hyper-V 3.5hrs

Module 10: Implementing Dynamic Access Control 5hrs

Overview of Dynamic Access Control

Planning for a Dynamic Access Control Implementation

Implementing and Configuring Dynamic Access Control

Lab : Implementing Dynamic Access Control 3.5hrs

Module 11: Implementing Active Directory Domain Services 5hrs

Deploying AD DS Domain Controllers

Configuring AD DS Domain Controllers

Implementing Service Accounts

Implementing Group Policy in AD DS

Maintaining AD DS

Lab : Implementing AD DS 3.5hrs

Module 12: Implementing Active Directory Federation Services 5hrs

Overview of AD FS

Deploying AD FS

Implementing AD FS for a Single Organization

Deploying AD FS in a B2B Federation Scenario

Lab : Implementing AD FS 3.5hrs

NH204-1011

Installing, Configuring & Administrating Windows

Server 2012

136 Total Hours

104 Theory Hours

32 Lab Hours

COURSE TITLE: Installing, Configuring & Administrating Windows Server 2012 PREREQUISITE: NH62-9293, or equivalent knowledge and skills

Page 198: €¦ · 2 Table of Contents Introduction

198

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 136 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Install and Configure Windows Server 2012.

Describe AD DS.

Manage Active Directory objects.

Automate Active Directory administration.

Implement IPv4.

Implement Dynamic Host Configuration Protocol (DHCP).

Implement Domain Name System (DNS).

Implement IPv6.

Implement local storage.

Share files and printers.

Implement Group Policy.

Use Group Policy Objects (GPOs) to secure Windows Servers.

Implement server virtualization using Hyper-V.

Deploy and Maintain Server Images

Configure and Troubleshoot DNS

Maintain Active Directory Domain Services (AD DS).

Manage User and Service Accounts

Implement a Group Policy Infrastructure

Manage User Desktops with Group Policy

Configure and Troubleshoot Remote Access

Install, Configure and Troubleshoot Network Policy Server (NPS) role

Implement Network Access Protection (NAP)

Optimize File Services

Configure Encryption and Advanced Auditing

Implement Update Management

Monitor Windows Server 2012

COURSE OBJECTIVES: This course provides the skills and knowledge necessary to implement a core Windows

Server 2012 infrastructure in an existing enterprise environment. The course covers implementing, managing,

maintaining, and provisioning services and infrastructure in a Windows Server 2012 environment. This course

primarily covers the initial implementation and configuration of core services including Active Directory Domain

Services (AD DS), networking services, and Microsoft Hyper-V Server 2012 configuration, and the administration

tasks necessary to maintain a Windows Server 2012 infrastructure such as Implementing Server Images, User and

Group management with Active Directory Domain Services(AD DS) and Group Policy, Remote Access and

Network Policies, Data Security, Monitoring and Update Management

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2013): Installing and Configuring Windows Server® 2012 – Microsoft Publishing

Arvato Bertelsmann (2013): Administering Windows Server® 2012 – Microsoft Publishing

Microsoft Server 2012 Software

Page 199: €¦ · 2 Table of Contents Introduction

199

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include theory, demonstration, discussion, practical application, simulation and presentations.

COURSE OUTLINE:

Module 1: Deploying and Managing Windows Server 2012 4hrs

Windows Server 2012 Overview

Overview of Windows Server 2012 Management

Installing Windows Server 2012

Post-Installation Configuration of Windows Server 2012

Introduction to Windows PowerShell

Lab : Deploying and Managing Windows Server 2012 1hrs

Module 2: Introduction to Active Directory Domain Services 4hrs

Overview of AD DS

Overview of Domain Controllers

Installing a Domain Controller

Lab : Installing Domain Controllers 1hrs

Module 3: Managing Active Directory Domain Services Objects 4hrs

Managing User Accounts

Managing Group Accounts

Managing Computer Accounts

Delegating Administration

Lab : Managing Active Directory Domain Services Objects 1hr

Module 4: Automating Active Directory Domain Services Administration 4hrs

Using Windows PowerShell for AD DS Administration

Performing Bulk Operations with Windows PowerShell

Lab : Automating AD DS Administration by Using Windows PowerShell 1hr

Module 5: Implementing IPv4 4hrs

Overview of TCP/IP

Understanding IPv4 Addressing

Subnetting and Supernetting

Configuring and Troubleshooting IPv4

Lab : Implementing IPv4 1hr

Module 6: Implementing Dynamic Host Configuration Protocol 4hrs

Installing a DHCP Server Role

Configuring DHCP Scopes

Managing a DHCP Database

Securing and Monitoring DHCP

Lab : Implementing DHCP 1hr

Module 7: Implementing Domain Name System 4hrs

Name Resolution for Windows Client and Servers

Page 200: €¦ · 2 Table of Contents Introduction

200

Installing and Managing a DNS Server

Managing DNS Zones

Lab : Implementing DNS 1hr

Module 8: Implementing IPv6 4hrs

Overview of IPv6

IPv6 Addressing

Coexistence with IPv6

IPv6 Transition Technologies

Lab : Implementing IPv6 1hr

Module 9: Implementing Local Storage 4hrs

Overview of Storage

Managing Disks and Volumes

Implementing Storage Spaces

Lab : Implementing Local Storage 1hr

Module 10: Implementing File and Print Services 4hrs

Securing Files and Folders

Protecting Shared Files and Folders by Using Shadow Copies

Configuring Network Printing

Lab : Implementing File and Print Services 1hr

Module 11: Implementing Group Policy 4hrs

Overview of Group Policy

Group Policy Processing

Implementing a Central Store for Administrative Templates

Lab : Implementing Group Policy 1hr

Module 12: Securing Windows Servers Using Group Policy Objects 4hrs

Windows Operating Systems Security Overview

Configuring Security Settings

Restricting Software

Configuring Windows Firewall with Advanced Security

Lab : Increasing Security for Server Resources 1hr

Lab : Configuring AppLocker and Windows Firewall 1hr

Module 13: Implementing Server Virtualization with Hyper-V 4hrs

Overview of Virtualization Technologies

Implementing Hyper-V

Managing Virtual Machine Storage

Managing Virtual Networks

Lab : Implementing Server Virtualization with Hyper-V 1hr

Module 14: Deploying and Maintaining Server Images 4hrs

Overview of Windows Deployment Services

Page 201: €¦ · 2 Table of Contents Introduction

201

Implementing Deployment with Windows Deployment Services

Administering Windows Deployment Services

Lab : Using Windows Deployment Services to Deploy Windows Server 2012 1hr

Module 15: Configuring and Troubleshooting Domain Name System 4hrs

Installing the DNS Server Role

Configuring the DNS Server Role

Configuring DNS Zones

Configuring DNS Zone Transfers

Managing and Troubleshooting DNS

Lab : Configuring and Troubleshooting DNS 1hr

Module 16: Maintaining Active Directory Domain Services 4hrs

Overview of AD DS

Implementing Virtualized Domain Controllers

Implementing RODC

Administering AD DS

Managing the AD DS Database

Lab : Maintaining AD DS 1hr

Module 17: Managing User and Service Accounts 4hrs

Automating User Account Management

Configuring Password-Policy and User-Account Lockout Settings

Configuring Managed Service Accounts

Lab : Managing User and Service Accounts 1hr

Module 18: Implementing a Group Policy Infrastructure 4hrs

Introducing Group Policy

Implementing and Administering Group Policy Objects (GPOs)

Group Policy Scope and Group Policy Processing

Troubleshooting the Application of GPOs

Lab : Implementing a Group Policy Infrastructure 1hr

Module 19: Managing User Desktops with Group Policy 4hrs

Implementing Administrative Templates

Configuring Folder Redirection and Scripts

Configuring Group Policy Preferences

Managing Software with Group Policy

Lab : Managing User Desktops with Group Policy 1hr

Module 20: Configuring and Troubleshooting Remote Access 4hrs

Configuring Network Access

Configuring Virtual Private Network (VPN) Access

Overview of Network Policies

Troubleshooting Routing and Remote Access

Configuring DirectAccess

Page 202: €¦ · 2 Table of Contents Introduction

202

Lab : Configuring Remote Access 1hr

Lab : Configuring DirectAccess 1hr

Module 21: Installing, Configuring, and Troubleshooting the Network Policy Server Role 4hrs

Installing and Configuring a NPS

Configuring Remote Authentication Dial-In User Service (RADIUS) Clients and Servers

NPS Authentication Methods

Monitoring and Troubleshooting a NPS

Lab : Installing and Configuring a Network Policy Server 1hr

Module 22: Implementing Network Access Protection 4hrs

Overview of Network Access Protection

Overview of NAP Enforcement Processes

Configuring NAP

Monitoring and Troubleshooting NAP

Lab : Implementing NAP 1hr

Module 23: Optimizing File Services 4hrs

Overview of FSRM

Using FSRM to Manage Quotas, File Screens, and Storage Reports

Implementing Classification and File Management Tasks

Overview of Distributed File System (DFS)

Configuring DFS Namespaces

Configuring and Troubleshooting Distributed File System Replication (DFS-R)

Lab : Configuring Quotas and File Screening Using FSRM 1hr

Lab : Implementing DFS 1hr

Module 24: Configuring Encryption and Advanced Auditing 4hrs

Encrypting Files by Using Encrypting File System

Configuring Advanced Auditing

Lab : Configuring Encryption and Advanced Auditing 2hrs

Module 25: Implementing Update Management 4hrs

Overview of WSUS

Deploying Updates with WSUS

Lab : Implementing Update Management 2hrs

Module 26: Monitoring Windows Server 2012 4hrs

Monitoring Tools

Using Performance Monitor

Monitoring Event Logs

Lab : Monitoring Windows Server 2012 2hrs

NH20412

Configuring Advanced Windows Server 2012

Services 104 Total Hours

64 Theory Hours

40 Lab Hours

Page 203: €¦ · 2 Table of Contents Introduction

203

COURSE TITLE: Configuring Advanced Windows Server 2012 Services PREREQUISITE: NH204-1011, or equivalent knowledge and skills

INSTRUCTOR: TBA

COURSE SCHEDULE: Classes are scheduled between 9:00 AM and 10:00PM, weekdays (dependent upon day or

evening sessions)

COURSE LENGTH: 104 hours

COURSE OVERVIEW: After completing this course, students will be able to:

Implement advanced network services.

Implement advanced file services.

Implement Dynamic Access Control.

Implement distributed Active Directory Domain Services (AD DS) deployments.

Implement AD DS sites and replication.

Implement Active Directory Certification Services (AD CS).

Implement Active Directory Rights Management Services (AD RMS).

Implement Active Directory Federation Services (AD FS).

Implement network load balancing (NLB).

Implement failover clustering.

Implement failover clustering with Hyper-V.

Implement disaster recovery.

COURSE OBJECTIVES: This course primarily covers advanced configuration of services necessary to deploy,

manage and maintain a Windows Server 2012 infrastructure, such as advanced networking services, Active

Directory Domain Services (AD DS), identity management, rights management, Federated services, network load

balancing, failover clustering, business continuity and disaster recovery.

MEDIA, TEXT, AND RESOURCE REQUIREMENTS:

Arvato Bertelsmann (2013): Configuring Advanced Windows Server® 2012 Services – Microsoft Publishing

Microsoft Server 2012 Software

INSTRUCTIONAL STRATEGIES: This course combines theory instructions with lab application. Instructional

strategies include THEORY, demonstration, discussion, practical application, simulation and presentations.

Multiple choice assessments are given at the end of each module.

COURSE OUTLINE:

Module 1: Implementing Advanced Network Services 6hrs

Configuring Advanced DHCP Features

Configuring Advanced DNS Settings

Implementing IPAM

Lab : Implementing Advanced Network Services 3hrs

Module 2: Implementing Advanced File Services 5hrs

Configuring iSCSI Storage

Configuring BranchCache

Optimizing Storage Usage

Lab : Implementing Advanced File Services 3hrs

Lab : Implementing BranchCache 3hrs

Module 3: Implementing Dynamic Access Control 5hrs

Overview of Dynamic Access Control

Planning for Dynamic Access Control

Deploying Dynamic Access Control

Lab : Implementing Dynamic Access Control 3hrs

Module 4: Implementing Distributed Active Directory Domain Services Deployments 5hrs

Overview of Distributed AD DS Deployments

Page 204: €¦ · 2 Table of Contents Introduction

204

Deploying a Distributed AD DS Environment

Configuring AD DS Trusts

Lab : Implementing Complex AD DS Deployments 4hrs

Module 5: Implementing Active Directory Domain Services Sites and Replication 5hrs

Overview of AD DS Replication

Configuring AD DS Sites

Configuring and Monitoring AD DS Replication

Lab : Implementing AD DS Sites and Replication 3hrs

Module 6: Implementing Active Directory Certificate Services 5hrs

PKI Overview

Deploying CAs

Deploying and Configuring CA Hierarchy

Deploying and Managing Certificate Templates

Implementing Certificate Distribution and Revocation

Managing Certificate Recovery

Lab : Deploying and Managing Certificates 3hrs

Module 7: Implementing Active Directory Rights Management Services 6hrs

AD RMS Overview

Deploying and Managing an AD RMS Infrastructure

Configuring AD RMS Content Protection

Configuring External Access to AD RMS

Lab : Implementing AD RMS 3hrs

Module 8: Implementing Active Directory Federation Services 5hrs

Overview of AD FS

Deploying AD FS

Implementing AD FS for a Single Organization

Deploying AD FS in a B2B Federation Scenario

Lab : Implementing AD FS 3hrs

Module 9: Implementing Network Load Balancing 6hrs

Overview of NLB

Configuring an NLB Cluster

Planning an NLB Implementation

Lab : Implementing Network Load Balancing 3hrs

Module 10: Implementing Failover Clustering 5hrs

Overview of Failover Clustering

Implementing a Failover Cluster

Configuring Highly Available Applications and Services on a Failover Cluster

Maintaining a Failover Cluster

Implementing a Multi-Site Failover Cluster

Lab : Implementing Failover Clustering 3hrs

Module 11: Implementing Failover Clustering with Hyper-V 5hrs

Overview of Integrating Hyper-V with Failover Clustering

Implementing Hyper-V Virtual Machines on Failover Clusters

Implementing Hyper-V Virtual Machine Movement

Managing Hyper-V Virtual Environments by Using VMM

Lab : Implementing Failover Clustering with Hyper-V 3hrs

Page 205: €¦ · 2 Table of Contents Introduction

205

Module 12: Implementing Disaster Recovery 6hrs

Overview of Disaster Recovery

Implementing Windows Server Backup

Implementing Server and Data Recovery