Microsoft Certified Solutions Associate(MCSA Windows Server 2008)
Server Administrator on Windows Server 2008
The Microsoft Certified IT Professional (MCITP) certification helps validate that an individual has the comprehensive set of skills necessary to perform a particularIT job role, such as database administrator or enterprise messaging administrator. MCITP certifications build on the technical proficiency measured in the Microsoft Certified Technology Specialist (MCTS) certifications. Therefore, you will earn one or more MCTS certifications on your way to earning an MCITP certification.
MCITP certifications will not be updated for future versions of Microsoft products. In most cases, as an MCITP, you will be eligible for special upgrade paths to new Microsoft Certified Solutions Expert (MCSE) certifications. Microsoft Certified Solution Expert (MCSE) is focused on an experienced professional’s ability to design and build technology solutions in the cloud and on premise.
Your MCITP certification will remain valuable as long as companies are using the technology on which it certifies.
Who Should do this Course
B.C.A, M.C.A, B.Sc. IT or Any IT certification holder can do this course No prerequisite for this course just basic computer operation or IT background student can join.
Duration : 2 Months
Already certified as a Microsoft Certified IT Professional (MCITP): Enterprise Administrator or MCITP: Server Administrator?
You have already earned the MCSA: Windows Server 2008 certification.

Exam Code :
Exam 70-640
Exam 70-642
Exam 70-646
Course Content : Exam 70-640:
Windows Server 2008 Active Directory, Configuring
Configuring Domain Name System (DNS) for Active Directory (18%)
Configure zones.
May include but is not limited to: Dynamic DNS (DDNS), Non-dynamic DNS (NDDNS), and Secure Dynamic DNS (SDDNS); Time to Live (TTL); GlobalNames; Primary, Secondary, Active Directory Integrated, Stub; SOA; zone scavenging; forward lookup; reverse lookup
Configure DNS server settings.
May include but is not limited to: forwarding; root hints; configure zone delegation; round robin; disable recursion; debug logging; server scavenging
Configure zone transfers and replication.
May include but is not limited to: configure replication scope (forestDNSzone; domainDNSzone); incremental zone transfers; DNS Notify; secure zone transfers; configure name servers; application directory partitions
Configuring the Active Directory infrastructure (17 percent)
Configure a forest or a domain.
May include but is not limited to: remove a domain; perform an unattended installation; Active Directory Migration Tool (ADMT) ; change forest and domain functional levels; interoperability with previous versions of Active Directory; multiple user principal name (UPN) suffixes; forestprep; domainprep
Configure trusts.
May include but is not limited to: forest trust; selective authentication vs. forest-wide authentication; transitive trust; external trust; shortcut trust; SID filtering
Configure sites.
May include but is not limited to: create Active Directory subnets; configure site links; configure site link costing; configure sites infrastructure
Configure Active Directory replication.
May include but is not limited to: DFSR; one-way replication; Bridgehead server; replication scheduling; configure replication protocols; force intersite replication
Configure the global catalog.
May include but is not limited to: Universal Group Membership Caching (UGMC); partial attribute set; promote to global catalog
Configure operations masters.
May include but is not limited to: seize and transfer; backup operations master; operations master placement; Schema Master; extending the schema; time service
Configuring Active Directory Roles and Services (14 percent)
Configure Active Directory Lightweight Directory Service (AD LDS).
May include but is not limited to: migration to AD LDS; configure data within AD LDS; configure an authentication server; Server Core Installation
Configure Active Directory Rights Management Service (AD RMS).
May include but is not limited to: certificate request and installation; self-enrollments; delegation; create RMS templates; RMS administrative roles; RM Add-on for IE
Configure the read-only domain controller (RODC).
May include but is not limited to: replication; Administrator role separation; read-only DNS; BitLocker; credential caching; password replication; syskey; read-only SYSVOL; staged install
Configure Active Directory Federation Services (AD FSv2).
May include but is not limited to: install AD FS server role; exchange certificate with AD FS agents; configure trust policies; configure user and group claim mapping; import and export trust policies
Creating and maintaining Active Directory objects (18 percent)
Automate creation of Active Directory accounts.
May include but is not limited to: bulk import; configure the UPN; create computer, user, and group accounts (scripts, import, migration); template accounts; contacts; distribution lists; offline domain join
Maintain Active Directory accounts.
May include but is not limited to: manage computer accounts; configure group membership; account resets; delegation; AGDLP/AGGUDLP; deny domain local group; local vs. domain; Protected Admin; disabling accounts vs. deleting accounts; deprovisioning; contacts; creating organizational units (OUs); delegation of control; protecting AD objects from deletion; managed service accounts
Create and apply Group Policy objects (GPOs).
May include but is not limited to: enforce, OU hierarchy, block inheritance, and enabling user objects; group policy processing priority; WMI; group policy filtering; group policy loopback; Group Policy Preferences (GPP)
Configure GPO templates.
May include but is not limited to: user rights; ADMX Central Store; administrative templates; security templates; restricted groups; security options; starter GPOs; shell access policies
Deploy and manage software by using GPOs.
May include but is not limited to: publishing to users; assigning software to users; assigning to computers; software removal; software restriction policies; AppLocker
Configure account policies.
May include but is not limited to: domain password policy; account lockout policy; fine-grain password policies
Configure audit policy by using GPOs.
May include but is not limited to: audit logon events; audit account logon events; audit policy change; audit access privilege use; audit directory service access; audit object access; advanced audit policies; global object access auditing; “Reason for Access” reporting
Maintaining the Active Directory environment (18 percent)
Configure backup and recovery.
May include but is not limited to: using Windows Server Backup; back up files and system state data to media; backup and restore by using removable media; perform an authoritative or non-authoritative restores; linked value replication; Directory Services Recovery Mode (DSRM); backup and restore GPOs; configure AD recycle bin
Perform offline maintenance.
May include but is not limited to: offline defragmentation and compaction; Restartable Active Directory; Active Directory database mounting tool
Monitor Active Directory.
May include but is not limited to: event viewer subscriptions; data collector sets; real-time monitoring; analyzing logs; WMI queries; PowerShell
Configuring Active Directory Certificate Services (15 percent)
Install Active Directory Certificate Services.
May include but is not limited to: certificate authority (CA) types, including standalone, enterprise, root, and subordinate; role services; prepare for multiple-forest deployments
Configure CA server settings.
May include but is not limited to: key archival; certificate database backup and restore; assigning administration roles; high-volume CAs; auditing
Manage certificate templates.
May include but is not limited to: certificate template types; securing template permissions; managing different certificate template versions; key recovery agent
Manage enrollments.
May include but is not limited to: network device enrollment service (NDES); auto enrollment; Web enrollment; extranet enrollment; smart card enrollment; authentication mechanism assurance; creating enrollment agents; deploying multiple-forest certificates; x.509 certificate mapping
Manage certificate revocations.
May include but is not limited to: configure Online Responders; Certificate Revocation List (CRL); CRL Distribution Point (CDP); Authority Information Access (AIA)
Course Content : Exam 70-642:
Windows Server 2008 Network Infrastructure, Configuring
Configuring Addressing and Services (21 percent)
Configure IPv4 and IPv6 addressing.
May include but is not limited to: configure IP address options; subnetting; supernetting; multi-homed; interoperability between IPv4 and IPv6
Configure Dynamic Host Configuration Protocol (DHCP).
May include but is not limited to: DHCP options; creating new options; PXE boot; default user profiles; DHCP relay agents; exclusions; authorize server in Active Directory; scopes; DHCPv6
Configure routing.
May include but is not limited to: static routing; persistent routing; Routing Internet Protocol (RIP); metrics; choosing a default gateway; maintaining a routing table; demand-dial routing; IGMP proxy
Configure Windows Firewall with Advanced Security.
May include but is not limited to: inbound and outbound rules; custom rules; authorized users; authorized computers; configure firewall by using Group Policy; network location profiles; service groups; import/export policies; isolation policy; IPsec group policies; Connection Security Rules
Configuring Names Resolution (22 percent)
Configure a Domain Name System (DNS) server.
May include but is not limited to: conditional forwarding; external forwarders; root hints; cache-only; socket pooling; cache locking
Configure DNS zones.
May include but is not limited to: zone scavenging; zone types; Active Directory integration; Dynamic Domain Name System (DDNS); Secure DDNS; GlobalNames; zone delegation; DNS Security Extensions (DNSSEC); reverse lookup zones
Configure DNS records.
May include but is not limited to: record types; Time to live (TTL); weighting records; registering records; netmask ordering; DnsUpdateProxy group; round robin; DNS record security; auditing
Configure DNS replication.
May include but is not limited to: DNS secondary zones; DNS stub zones; Active Directory Integrated replication scopes; securing zone transfer; SOA refresh; auditing
Configure name resolution for client computers.
May include but is not limited to: configuring HOSTS file; Link-Local Multicast Name Resolution (LLMNR); broadcasting; resolver cache; DNS server list; Suffix Search order; DNS devolution
Configuring Network Access (18 percent)
Configure remote access.
May include but is not limited to: dial-up; Remote Access Policy; Network Address Translation (NAT); VPN protocols, such as Secure Socket Tunneling Protocol (SSTP) and IKEv2; Routing and Remote Access Services (RRAS); packet filters; Connection Manager; VPN reconnect; RAS authentication by using MS-CHAP, MS-CHAP v2, and EAP
Configure Network Access Protection (NAP).
May include but is not limited to: network layer protection; DHCP enforcement; VPN enforcement; RDS enforcement; configure NAP health policies; IPsec enforcement; 802.1x enforcement; flexible host isolation; multi-configuration System Health Validator (SHV)
Configure DirectAccess.
May include but is not limited to: IPv6; IPsec; server requirements; client requirements; perimeter network; name resolution policy table
Configure Network Policy Server (NPS).
May include but is not limited to: IEEE 802.11 wireless; IEEE 802.3 wired; group policy for wireless; RADIUS accounting; Connection Request policies; RADIUS proxy; NPS templates
Configuring File and Print Services (20 percent)
Configure a file server.
May include but is not limited to: file share publishing; Offline Files; share permissions; NTFS permissions; encrypting file system (EFS); BitLocker; Access-Based Enumeration (ABE); branch cache; Share and Storage Management console
Configure Distributed File System (DFS).
May include but is not limited to: DFS namespace; DFS configuration and application; creating and configuring targets; DFS replication; read-only replicated folder; failover cluster support; health reporting
Configure backup and restore.
May include but is not limited to: backup types; backup schedules; managing remotely; restoring data; shadow copy services; volume snapshot services (VSS); bare metal restore; backup to remote file share
Manage file server resources.
May include but is not limited to: FSRM; quota by volume or quota by user; quota entries; quota templates; file classification; Storage Manager for SANs; file management tasks; file screening
Configure and monitor print services.
May include but is not limited to: printer share; publish printers to Active Directory; printer permissions; deploy printer connections; install printer drivers; export and import print queues and printer settings; add counters to Performance Monitor to monitor print servers; print pooling; print priority; print driver isolation; location-aware printing; print management delegation
Monitoring and Managing a Network Infrastructure (20 percent)
Configure Windows Server Update Services (WSUS) server settings.
May include but is not limited to: update type selection; client settings; Group Policy object (GPO); client targeting; software updates; test and approval; disconnected networks
Configure performance monitoring.
May include but is not limited to: Data Collector Sets; Performance Monitor; Reliability Monitor; monitoring System Stability Index; page files; analyze performance data
Configure event logs.
May include but is not limited to: custom views; application and services logs; subscriptions; attaching tasks to events find and filter
Gather network data.
May include but is not limited to: Simple Network Management Protocol (SNMP); Network Monitor; Connection Security Rules monitoring
Cource content: Exam 70-646:
Windows Server 2008, Server Administrator
Planning for Server Deployment (19 percent)
Plan server installations and upgrades.
May include but is not limited to: Windows Server 2008 edition selection, rollback planning, Bitlocker implementation requirements
Plan for automated server deployment.
May include but is not limited to: standard server image, automation and scheduling of server deployments
Plan infrastructure services server roles.
May include but is not limited to: address assignment, name resolution, network access control, directory services, application services, certificate services
Plan application servers and services.
May include but is not limited to: virtualization server planning, availability, resilience, and accessibility
Plan file and print server roles.
May include but is not limited to: access permissions, storage quotas, replication, indexing, file storage policy, availability, printer publishing
Planning for Server Management (23 percent)
Plan server management strategies.
May include but is not limited to: remote administration, remote desktop, server management technologies, Server Manager and ServerManagerCMD, delegation policies and procedures
Plan for delegated administration.
May include but is not limited to: delegate authority, delegate Active Directory objects, application management
Plan and implement group policy strategy.
May include but is not limited to: GPO management, GPO backup and recovery, group policy troubleshooting, group policy planning
Monitoring and Maintaining Servers (20 percent)
Implement patch management strategy.
May include but is not limited to: operating system patch level maintenance, Windows Server Update Services (WSUS), application patch level maintenance
Monitor servers for performance evaluation and optimization.
May include but is not limited to: server and service monitoring, optimization, event management, trending and baseline analysis
Monitor and maintain security and policies.
May include but is not limited to: remote access, monitor and maintain NPAS, network access, server security, firewall rules and policies, authentication and authorization, data security, auditing
Planning Application and Data Provisioning (19 percent)
Provision applications. May include but is not limited to: presentation virtualization, terminal server infrastructure, resource allocation, application virtualization alternatives, application deployment, System Center Configuration Manager
Provision data. May include but is not limited to: shared resources, offline data access
Planning for Business Continuity and High Availability (19 percent)
Plan storage.May include but is not limited to: storage solutions, storage management
Plan high availability.
May include but is not limited to: service redundancy, service availability
Plan for backup and recovery.
May include but is not limited to: data recovery strategy, server recovery strategy, directory service recovery strategy, object level recovery
Microsoft Certified Solutions Associate(MCSA Windows Server 2012)
Prove your expertise on Microsoft core platform skills by earning a Microsoft Certified Solutions Associate (MCSA) certification.
The Microsoft Certified Solutions Associate (MCSA) certification is for IT professionals and developers looking to get their first job in Microsoft technology. Whether in the cloud or on-premise, this certification validates the core platform skills needed in an IT environment. The MCSA certifications are a requirement to achieve our flagship
Who Should do this Course
B.C.A, M.C.A, B.Sc. IT or Any IT certification holder can do this course No prerequisite for this course just basic computer operation or IT background student can join.
Duration :2 Months
Windows Server 2012 certification


Exam Code:
Exam 70-640
Exam 70-642
Exam 70-646
Why ISHA computer :
ISHA Computer is a leader in the high end
Latest technologies IT education industry and ITES . Organizations continue to upgrade, standardize and integrate their systems to develop and sustain their competitive edge.
Industrial Experienced Faculty
Microsoft Certified Trainer
Totally Practical Training into LAB
Dedicated Lab Facility (10 AM to 7 PM )
JOB Assistance
Course Content : Exam 70-640:
Windows Server 2008 Active Directory, Configuring
Configuring Domain Name System (DNS) for Active Directory (18%)
Configure zones.
May include but is not limited to: Dynamic DNS (DDNS), Non-dynamic DNS (NDDNS), and Secure Dynamic DNS (SDDNS); Time to Live (TTL); GlobalNames; Primary, Secondary, Active Directory Integrated, Stub; SOA; zone scavenging; forward lookup; reverse lookup
Configure DNS server settings.
May include but is not limited to: forwarding; root hints; configure zone delegation; round robin; disable recursion; debug logging; server scavenging
Configure zone transfers and replication.
May include but is not limited to: configure replication scope (forestDNSzone; domainDNSzone); incremental zone transfers; DNS Notify; secure zone transfers; configure name servers; application directory partitions
Configuring the Active Directory infrastructure (17 percent)
Configure a forest or a domain.
May include but is not limited to: remove a domain; perform an unattended installation; Active Directory Migration Tool (ADMT) ; change forest and domain functional levels; interoperability with previous versions of Active Directory; multiple user principal name (UPN) suffixes; forestprep; domainprep
Configure trusts.
May include but is not limited to: forest trust; selective authentication vs. forest-wide authentication; transitive trust; external trust; shortcut trust; SID filtering
Configure sites.
May include but is not limited to: create Active Directory subnets; configure site links; configure site link costing; configure sites infrastructure
Configure Active Directory replication.
May include but is not limited to: DFSR; one-way replication; Bridgehead server; replication scheduling; configure replication protocols; force intersite replication
Configure the global catalog.
May include but is not limited to: Universal Group Membership Caching (UGMC); partial attribute set; promote to global catalog
Configure operations masters.
May include but is not limited to: seize and transfer; backup operations master; operations master placement; Schema Master; extending the schema; time service
Configuring Active Directory Roles and Services (14 percent)
Configure Active Directory Lightweight Directory Service (AD LDS).
May include but is not limited to: migration to AD LDS; configure data within AD LDS; configure an authentication server; Server Core Installation
Configure Active Directory Rights Management Service (AD RMS).
May include but is not limited to: certificate request and installation; self-enrollments; delegation; create RMS templates; RMS administrative roles; RM Add-on for IE
Configure the read-only domain controller (RODC).
May include but is not limited to: replication; Administrator role separation; read-only DNS; BitLocker; credential caching; password replication; syskey; read-only SYSVOL; staged install
Configure Active Directory Federation Services (AD FSv2).
May include but is not limited to: install AD FS server role; exchange certificate with AD FS agents; configure trust policies; configure user and group claim mapping; import and export trust policies
Creating and maintaining Active Directory objects (18 percent)
Automate creation of Active Directory accounts.
May include but is not limited to: bulk import; configure the UPN; create computer, user, and group accounts (scripts, import, migration); template accounts; contacts; distribution lists; offline domain join
Maintain Active Directory accounts.
May include but is not limited to: manage computer accounts; configure group membership; account resets; delegation; AGDLP/AGGUDLP; deny domain local group; local vs. domain; Protected Admin; disabling accounts vs. deleting accounts; deprovisioning; contacts; creating organizational units (OUs); delegation of control; protecting AD objects from deletion; managed service accounts
Create and apply Group Policy objects (GPOs).
May include but is not limited to: enforce, OU hierarchy, block inheritance, and enabling user objects; group policy processing priority; WMI; group policy filtering; group policy loopback; Group Policy Preferences (GPP)
Configure GPO templates.
May include but is not limited to: user rights; ADMX Central Store; administrative templates; security templates; restricted groups; security options; starter GPOs; shell access policies
Deploy and manage software by using GPOs.
May include but is not limited to: publishing to users; assigning software to users; assigning to computers; software removal; software restriction policies; AppLocker
Configure account policies.
May include but is not limited to: domain password policy; account lockout policy; fine-grain password policies
Configure audit policy by using GPOs.
May include but is not limited to: audit logon events; audit account logon events; audit policy change; audit access privilege use; audit directory service access; audit object access; advanced audit policies; global object access auditing; “Reason for Access†reporting
Maintaining the Active Directory environment (18 percent)
Configure backup and recovery.
May include but is not limited to: using Windows Server Backup; back up files and system state data to media; backup and restore by using removable media; perform an authoritative or non-authoritative restores; linked value replication; Directory Services Recovery Mode (DSRM); backup and restore GPOs; configure AD recycle bin
Perform offline maintenance.
May include but is not limited to: offline defragmentation and compaction; Restartable Active Directory; Active Directory database mounting tool
Monitor Active Directory.
May include but is not limited to: event viewer subscriptions; data collector sets; real-time monitoring; analyzing logs; WMI queries; PowerShell
Configuring Active Directory Certificate Services (15 percent)
Install Active Directory Certificate Services.
May include but is not limited to: certificate authority (CA) types, including standalone, enterprise, root, and subordinate; role services; prepare for multiple-forest deployments
Configure CA server settings.
May include but is not limited to: key archival; certificate database backup and restore; assigning administration roles; high-volume CAs; auditing
Manage certificate templates.
May include but is not limited to: certificate template types; securing template permissions; managing different certificate template versions; key recovery agent
Manage enrollments.
May include but is not limited to: network device enrollment service (NDES); auto enrollment; Web enrollment; extranet enrollment; smart card enrollment; authentication mechanism assurance; creating enrollment agents; deploying multiple-forest certificates; x.509 certificate mapping
Manage certificate revocations.
May include but is not limited to: configure Online Responders; Certificate Revocation List (CRL); CRL Distribution Point (CDP); Authority Information Access (AIA)
Course Content : Exam 70-642:
Windows Server 2008 Network Infrastructure
Configuring Addressing and Services (21 percent)
Configure IPv4 and IPv6 addressing.
May include but is not limited to: configure IP address options; subnetting; supernetting; multi-homed; interoperability between IPv4 and IPv6
Configure Dynamic Host Configuration Protocol (DHCP).
May include but is not limited to: DHCP options; creating new options; PXE boot; default user profiles; DHCP relay agents; exclusions; authorize server in Active Directory; scopes; DHCPv6
Configure routing.
May include but is not limited to: static routing; persistent routing; Routing Internet Protocol (RIP); metrics; choosing a default gateway; maintaining a routing table; demand-dial routing; IGMP proxy
Configure Windows Firewall with Advanced Security.
May include but is not limited to: inbound and outbound rules; custom rules; authorized users; authorized computers; configure firewall by using Group Policy; network location profiles; service groups; import/export policies; isolation policy; IPsec group policies; Connection Security Rules
Configuring Names Resolution (22 percent)
Configure a Domain Name System (DNS) server.
May include but is not limited to: conditional forwarding; external forwarders; root hints; cache-only; socket pooling; cache locking
Configure DNS zones.
May include but is not limited to: zone scavenging; zone types; Active Directory integration; Dynamic Domain Name System (DDNS); Secure DDNS; GlobalNames; zone delegation; DNS Security Extensions (DNSSEC); reverse lookup zones
Configure DNS records.
May include but is not limited to: record types; Time to live (TTL); weighting records; registering records; netmask ordering; DnsUpdateProxy group; round robin; DNS record security; auditing
Configure DNS replication.
May include but is not limited to: DNS secondary zones; DNS stub zones; Active Directory Integrated replication scopes; securing zone transfer; SOA refresh; auditing
Configure name resolution for client computers.
May include but is not limited to: configuring HOSTS file; Link-Local Multicast Name Resolution (LLMNR); broadcasting; resolver cache; DNS server list; Suffix Search order; DNS devolution
Configuring Network Access (18 percent)
Configure remote access.
May include but is not limited to: dial-up; Remote Access Policy; Network Address Translation (NAT); VPN protocols, such as Secure Socket Tunneling Protocol (SSTP) and IKEv2; Routing and Remote Access Services (RRAS); packet filters; Connection Manager; VPN reconnect; RAS authentication by using MS-CHAP, MS-CHAP v2, and EAP
Configure Network Access Protection (NAP).
May include but is not limited to: network layer protection; DHCP enforcement; VPN enforcement; RDS enforcement; configure NAP health policies; IPsec enforcement; 802.1x enforcement; flexible host isolation; multi-configuration System Health Validator (SHV)
Configure DirectAccess.
May include but is not limited to: IPv6; IPsec; server requirements; client requirements; perimeter network; name resolution policy table
Configure Network Policy Server (NPS).
May include but is not limited to: IEEE 802.11 wireless; IEEE 802.3 wired; group policy for wireless; RADIUS accounting; Connection Request policies; RADIUS proxy; NPS templates
Configuring File and Print Services (20 percent)
Configure a file server.
May include but is not limited to: file share publishing; Offline Files; share permissions; NTFS permissions; encrypting file system (EFS); BitLocker; Access-Based Enumeration (ABE); branch cache; Share and Storage Management console
Configure Distributed File System (DFS).
May include but is not limited to: DFS namespace; DFS configuration and application; creating and configuring targets; DFS replication; read-only replicated folder; failover cluster support; health reporting
Configure backup and restore.
May include but is not limited to: backup types; backup schedules; managing remotely; restoring data; shadow copy services; volume snapshot services (VSS); bare metal restore; backup to remote file share
Manage file server resources.
May include but is not limited to: FSRM; quota by volume or quota by user; quota entries; quota templates; file classification; Storage Manager for SANs; file management tasks; file screening
Configure and monitor print services.
May include but is not limited to: printer share; publish printers to Active Directory; printer permissions; deploy printer connections; install printer drivers; export and import print queues and printer settings; add counters to Performance Monitor to monitor print servers; print pooling; print priority; print driver isolation; location-aware printing; print management delegation
Monitoring and Managing a Network Infrastructure (20 percent)
Configure Windows Server Update Services (WSUS) server settings.
May include but is not limited to: update type selection; client settings; Group Policy object (GPO); client targeting; software updates; test and approval; disconnected networks
Configure performance monitoring.
May include but is not limited to: Data Collector Sets; Performance Monitor; Reliability Monitor; monitoring System Stability Index; page files; analyze performance data
Configure event logs.
May include but is not limited to: custom views; application and services logs; subscriptions; attaching tasks to events find and filter
Gather network data.
May include but is not limited to: Simple Network Management Protocol (SNMP); Network Monitor; Connection Security Rules monitoring
Course Content : Exam 70-646:
Windows Server 2008, Server Administrator
Planning for Server Deployment (19 percent)
Plan server installations and upgrades. May include but is not limited to: Windows Server 2008 edition selection, rollback planning, Bitlocker implementation requirements
Plan for automated server deployment. May include but is not limited to: standard server image, automation and scheduling of server deployments
Plan infrastructure services server roles. May include but is not limited to: address assignment, name resolution, network access control, directory services, application services, certificate services
Plan application servers and services. May include but is not limited to: virtualization server planning, availability, resilience, and accessibility
Plan file and print server roles. May include but is not limited to: access permissions, storage quotas, replication, indexing, file storage policy, availability, printer publishing
Planning for Server Management (23 percent)
Plan server management strategies. May include but is not limited to: remote administration, remote desktop, server management technologies, Server Manager and ServerManagerCMD, delegation policies and procedures
Plan for delegated administration. May include but is not limited to: delegate authority, delegate Active Directory objects, application management
Plan and implement group policy strategy. May include but is not limited to: GPO management, GPO backup and recovery, group policy troubleshooting, group policy planning
Monitoring and Maintaining Servers (20 percent)
Implement patch management strategy. May include but is not limited to: operating system patch level maintenance, Windows Server Update Services (WSUS), application patch level maintenance
Monitor servers for performance evaluation and optimization. May include but is not limited to: server and service monitoring, optimization, event management, trending and baseline analysis
Monitor and maintain security and policies. May include but is not limited to: remote access, monitor and maintain NPAS, network access, server security, firewall rules and policies, authentication and authorization, data security, auditing
Planning Application and Data Provisioning (19 percent)
Provision applications. May include but is not limited to: presentation virtualization, terminal server infrastructure, resource allocation, application virtualization alternatives, application deployment, System Center Configuration Manager
Provision data. May include but is not limited to: shared resources, offline data access
Planning for Business Continuity and High Availability (19 percent)
Plan storage. May include but is not limited to: storage solutions, storage management
Plan high availability. May include but is not limited to: service redundancy, service availability
Plan for backup and recovery. May include but is not limited to: data recovery strategy, server recovery strategy, directory service recovery strategy, object level recovery
Microsoft Certified Solutions Associate(MCSA Windows Server 2012)
Prove your expertise on Microsoft core platform skills by earning a Microsoft Certified Solutions Associate (MCSA) certification.
The Microsoft Certified Solutions Associate (MCSA) certification is for IT professionals and developers looking to get their first job in Microsoft technology. Whether in the cloud or on-premise, this certification validates the core platform skills needed in an IT environment. The MCSA certifications are a requirement to achieve our flagship
Who Should do this Course
B.C.A, M.C.A, B.Sc. IT or Any IT certification holder can do this course No prerequisite for this course just basic computer operation or IT background student can join.
Duration : 2 Months


Exam Code :
Exam 70-410
Exam 70-411
Exam 70-412
Why ISHA computer:
ISHA Computer is a leader in the high end
Latest technologies IT education industry and ITES . Organizations continue to upgrade, standardize and integrate their systems to develop and sustain their competitive edge.
Industrial Experienced Faculty
Microsoft Certified Trainer
Totally Practical Training into LAB
Dedicated Lab Facility (10 AM to 7 PM )
JOB Assistance
Course Content : Exam 70-410
Installing and Configuring Windows Server 2012
Install and Configure Servers (17%)
Install servers
This objective may include but is not limited to: Plan for a server installation; plan for server roles; plan for a server upgrade; install Server Core; optimize resource utilization by using Features on Demand; migrate roles from previous versions of Windows Server
Configure servers
This objective may include but is not limited to: Configure Server Core; delegate administration; add and remove features in offline images; deploy roles on remote servers; convert Server Core to/from full GUI; configure services; configure NIC teaming
Configure local storage
This objective may include but is not limited to: Design storage spaces; configure basic and dynamic disks; configure MBR and GPT disks; manage volumes; create and mount virtual hard disks (VHDs); configure storage pools and disk pools
Configure Server Roles and Features (16%)
Configure file and share access
This objective may include but is not limited to: Create and configure shares; configure share permissions; configure offline files; configure NTFS permissions; configure access-based enumeration (ABE); configure Volume Shadow Copy Service (VSS); configure NTFS quotas
Configure print and document services
This objective may include but is not limited to: Configure the Easy Print print driver; configure Enterprise Print Management; configure drivers; configure printer pooling; configure print priorities; configure printer permissions
Configure servers for remote management
This objective may include but is not limited to: Configure WinRM; configure down-level server management; configure servers for day-to-day management tasks; configure multi-server management; configure Server Core; configure Windows Firewall
Configure Hyper-V (16%)
Create and configure virtual machine settings
This objective may include but is not limited to: Configure dynamic memory; configure smart paging; configure Resource Metering; configure guest integration services
Create and configure virtual machine storage
This objective may include but is not limited to: Create VHDs and VHDX; configure differencing drives; modify VHDs; configure pass-through disks; manage snapshots; implement a virtual Fibre Channel adapter
Create and configure virtual networks
This objective may include but is not limited to: Implement Hyper-V Network Virtualization; configure Hyper-V virtual switches; optimize network performance; configure MAC addresses; configure network isolation; configure synthetic and legacy virtual network adapters
Deploy and Configure Core Network Services (16%)
Configure IPv4 and IPv6 addressing
This objective may include but is not limited to: Configure IP address options; configure subnetting; configure supernetting; configure interoperability between IPv4 and IPv6; configure ISATAP; configure Teredo
Deploy and configure Dynamic Host Configuration Protocol (DHCP) service
This objective may include but is not limited to: Create and configure scopes; configure a DHCP reservation; configure DHCP options; configure client and server for PXE boot; configure DHCP relay agent; authorize DHCP server
Deploy and configure DNS service
This objective may include but is not limited to: Configure Active Directory integration of primary zones; configure forwarders; configure Root Hints; manage DNS cache; create A and PTR resource records
Install and Administer Active Directory (18%)
Install domain controllers
This objective may include but is not limited to: Add or remove a domain controller from a domain; upgrade a domain controller; install Active Directory Domain Services (AD DS) on a Server Core installation; install a domain controller from Install from Media (IFM); resolve DNS SRV record registration issues; configure a global catalog server
Create and manage Active Directory users and computers
This objective may include but is not limited to: Automate the creation of Active Directory accounts; create, copy, configure, and delete users and computers; configure templates; perform bulk Active Directory operations; configure user rights; offline domain join; manage inactive and disabled accounts
Create and manage Active Directory groups and organizational units (OUs)
This objective may include but is not limited to: Configure group nesting; convert groups including security, distribution, universal, domain local, and domain global; manage group membership using Group Policy; enumerate group membership; delegate the creation and management of Active Directory objects; manage default Active Directory containers; create, copy, configure, and delete groups and OUs
Create and Manage Group Policy (16%)
Create Group Policy objects (GPOs)
This objective may include but is not limited to: Configure a Central Store; manage starter GPOs; configure GPO links; configure multiple local group policies; configure security filtering
Configure security policies
This objective may include but is not limited to: Configure User Rights Assignment; configure Security Options settings; configure Security templates; configure Audit Policy; configure Local Users and Groups; configure User Account Control (UAC)
Configure application restriction policies
This objective may include but is not limited to: Configure rule enforcement; configure Applocker rules; configure Software Restriction Policies
Configure Windows Firewall
This objective may include but is not limited to: Configure rules for multiple profiles using Group Policy; configure connection security rules; configure Windows Firewall to allow or deny applications, scopes, ports, and users; configure authenticated firewall exceptions; import and export settings
Course Content : Exam 70-411:
Administering Windows Server 2012
Deploy, Manage, and Maintain Servers (17%)
Deploy and manage server images.
This objective may include but is not limited to: Install the Windows Deployment Services (WDS) role; configure and manage boot, install, and discover images; update images with patches, hotfixes, and drivers; install features for offline images
Implement patch management.
This objective may include but is not limited to: Install and configure the Windows Server Update Services (WSUS) role; configure group policies for updates; configure client-side targeting; configure WSUS synchronization; configure WSUS groups
Monitor servers.
This objective may include but is not limited to: Configure Data Collector Sets (DCS); configure alerts; monitor real-time performance; monitor virtual machines (VMs); monitor events; configure event subscriptions; configure network monitoring
Configure File and Print Services (15%)
Configure Distributed File System (DFS).
This objective may include but is not limited to: Install and configure DFS namespaces; configure DFS Replication Targets; configure Replication Scheduling; configure Remote Differential Compression settings; configure staging; configure fault tolerance
Configure File Server Resource Manager (FSRM).
This objective may include but is not limited to: Install the FSRM role; configure quotas; configure file screens; configure reports
Configure file and disk encryption.
This objective may include but is not limited to: Configure Bitlocker encryption; configure the Network Unlock feature; configure Bitlocker policies; configure the EFS recovery agent; manage EFS and Bitlocker certificates including backup and restore
Configure advanced audit policies.
This objective may include but is not limited to: Implement auditing using Group Policy and AuditPol.exe; create expression-based audit policies; create removable device audit policies
Configure Network Services and Access (17%)
Configure DNS zones.
This objective may include but is not limited to: Configure primary and secondary zones; configure stub zones; configure conditional forwards; configure zone and conditional forward storage in Active Directory; configure zone delegation; configure zone transfer settings; configure notify settings
Configure DNS records.
This objective may include but is not limited to: Create and configure DNS Resource Records (RR) including A, AAAA, PTR, SOA, NS, SRV, CNAME, and MX records; configure zone scavenging; configure record options including Time To Live (TTL) and weight; configure round robin; configure secure dynamic updates
Configure VPN and routing.
This objective may include but is not limited to: Install and configure the Remote Access role; implement Network Address Translation (NAT); configure VPN settings; configure remote dial-in settings for users; configure routing
Configure DirectAccess.
This objective may include but is not limited to: Implement server requirements; implement client configuration; configure DNS for Direct Access; configure certificates for Direct Access
Configure a Network Policy Server Infrastructure (14%)
Configure Network Policy Server (NPS).
This objective may include but is not limited to: Configure multiple RADIUS server infrastructures; configure RADIUS clients; manage RADIUS templates; configure RADIUS accounting; configure certificates
Configure NPS policies.
This objective may include but is not limited to: Configure connection request policies; configure network policies for VPN clients (multilink and bandwidth allocation, IP filters, encryption, IP addressing); manage NPS templates; import and export NPS policies
Configure Network Access Protection (NAP).
This objective may include but is not limited to: Configure System Health Validators (SHVs); configure health policies; configure NAP enforcement using DHCP and VPN; configure isolation and remediation of non-compliant computers using DHCP and VPN; configure NAP client settings
Configure and Manage Active Directory (19%)
Configure service authentication.
This objective may include but is not limited to: Create and configure Service Accounts; create and configure Group Managed Service Accounts; create and configure Managed Service Accounts; configure Kerberos delegation; manage Service Principal Names (SPNs)
Configure Domain Controllers.
This objective may include but is not limited to: Configure Universal Group Membership Caching (UGMC); transfer and seize operations masters; install and configure a read-only domain controller (RODC); configure Domain Controller cloning
Maintain Active Directory.
This objective may include but is not limited to: Back up Active Directory and SYSVOL; manage Active Directory offline; optimize an Active Directory database; clean up metadata; configure Active Directory snapshots; perform object- and container-level recovery; perform Active Directory restore
Configure account policies.
This objective may include but is not limited to: Configure domain user password policy; configure and apply Password Settings Objects (PSOs); delegate password settings management; configure local user password policy; configure account lockout settings
Configure and Manage Group Policy (18%)
Configure Group Policy processing.
This objective may include but is not limited to: Configure processing order and precedence; configure blocking of inheritance; configure enforced policies; configure security filtering and WMI filtering; configure loopback processing; configure and manage slow-link processing; configure client-side extension (CSE) behavior
Configure Group Policy settings.
This objective may include but is not limited to: Configure settings including software installation, folder redirection, scripts, and administrative template settings; import security templates; import custom administrative template file; convert administrative templates using ADMX Migrator; configure property filters for administrative templates
Manage Group Policy objects (GPOs).
This objective may include but is not limited to: Back up, import, copy, and restore GPOs; create and configure Migration Table; reset default GPOs; delegate Group Policy management
Configure Group Policy preferences.
This objective may include but is not limited to: Configure Group Policy Preferences (GPP) settings including printers, network drive mappings, power options, custom registry settings, Control Panel settings, Internet Explorer settings, file and folder deployment, and shortcut deployment; configure item-level targeting
Course Content : Exam 70-412:
Configuring Advanced Windows Server 2012 Services
Configure and Manage High Availability (16%)
Configure Network Load Balancing (NLB).
This objective may include but is not limited to: Install NLB nodes; configure NLB prerequisites; configure affinity; configure port rules; configure cluster operation mode; upgrade an NLB cluster
Configure failover clustering.
This objective may include but is not limited to: Configure Quorum; configure cluster networking; restore single node or cluster configuration; configure cluster storage; implement Cluster Aware Updating; upgrade a cluster
Manage failover clustering roles.
This objective may include but is not limited to: Configure role-specific settings including continuously available shares; configure VM monitoring; configure failover and preference settings
Manage Virtual Machine (VM) movement.
This objective may include but is not limited to: Perform Live Migration; perform quick migration; perform storage migration; import, export, and copy VMs; migrate from other platforms (P2V and V2V)
Configure File and Storage Solutions (15%)
Configure advanced file services.
This objective may include but is not limited to: Configure NFS data store; configure BranchCache; configure File Classification Infrastructure (FCI) using File Server Resource Manager (FSRM); configure file access auditing
Implement Dynamic Access Control (DAC).
This objective may include but is not limited to: Configure user and device claim types; implement policy changes and staging; perform access-denied remediation; configure file classification
Configure and optimize storage.
This objective may include but is not limited to: Configure iSCSI Target and Initiator; configure Internet Storage Name server (iSNS); implement thin provisioning and trim; manage server free space using Features on Demand
Implement Business Continuity and Disaster Recovery (18%)
Configure and manage backups.
This objective may include but is not limited to: Configure Windows Server backups; configure Windows Online backups; configure role-specific backups; manage VSS settings using VSSAdmin; create System Restore snapshots
Recover servers.
This objective may include but is not limited to: Restore from backups; perform a Bare Metal Restore (BMR); recover servers using Windows Recovery Environment (Win RE) and safe mode; apply System Restore snapshots; configure the Boot Configuration Data (BCD) store
Configure site-level fault tolerance.
This objective may include but is not limited to: Configure Hyper-V Replica including Hyper-V Replica Broker and VMs; configure multi-site clustering including network settings, Quorum, and failover settings
Configure Network Services (17%)
Implement an advanced Dynamic Host Configuration Protocol (DHCP) solution.
This objective may include but is not limited to: Create and configure superscopes and multicast scopes; implement DHCPv6; configure high availability for DHCP including DHCP failover and split scopes; configure DHCP Name Protection
Implement an advanced DNS solution.
This objective may include but is not limited to: Configure security for DNS including DNSSEC, DNS Socket Pool, and cache locking; configure DNS logging; configure delegated administration; configure recursion; configure netmask ordering; configure a GlobalNames zone
Deploy and manage IPAM.
This objective may include but is not limited to: Configure IPAM manually or by using Group Policy; configure server discovery; create and manage IP blocks and ranges; monitor utilization of IP address space; migrate to IPAM; delegate IPAM administration; manage IPAM collections
Configure the Active Directory Infrastructure (18%)
Configure a forest or a domain.
This objective may include but is not limited to: Implement multi-domain and multi-forest Active Directory environments including interoperability with previous versions of Active Directory; upgrade existing domains and forests including environment preparation and functional levels; configure multiple user principal name (UPN) suffixes
Configure trusts.
This objective may include but is not limited to: Configure external, forest, shortcut, and realm trusts; configure trust authentication; configure SID filtering; configure name suffix routing
Configure sites.
This objective may include but is not limited to: Configure sites and subnets; create and configure site links; manage site coverage; manage registration of SRV records; move domain controllers between sites
Manage Active Directory and SYSVOL replication.
This objective may include but is not limited to: Configure replication to Read-Only Domain Controllers (RODCs); configure Password Replication Policy (PRP) for RODCs; monitor and manage replication; upgrade SYSVOL replication to Distributed File System Replication (DFS)
Configure Identity and Access Solutions (15%)
Implement Active Directory Federation Services 2.1 (AD FSv2.1).
This objective may include but is not limited to: Implement claims-based authentication including Relying Party Trusts; configure Claims Provider Trust rules; configure attribute stores including Active Directory Lightweight Directory Services (AD LDS); manage AD FS certificates; configure AD FS proxy; integrate with Cloud Services
Install and configure Active Directory Certificate Services (AD CS).
This objective may include but is not limited to: Install an Enterprise Certificate Authority (CA); configure CRL distribution points; install and configure Online Responder; implement administrative role separation; configure CA backup and recovery
Manage certificates.
This objective may include but is not limited to: Manage certificate templates; implement and manage certificate deployment, validation, and revocation; manage certificate renewal; manage certificate enrollment and renewal to computers and users using Group Policies; configure and manage key archival and recovery
Install and configure Active Directory Rights Management Services (AD RMS).
This objective may include but is not limited to: Install a licensing or certificate AD RMS server; manage AD RMS Service Connection Point (SCP); manage AD RMS client deployment; manage Trusted User Domains; manage Trusted Publishing Domains; manage Federated Identity support; manage RMS templates; configure Exclusion Policies
Microsoft Certified Technology Specialist (MCTS)
Who Should do this Course
Level: One or more years of experience implementing, troubleshooting, and debugging a specific technology
Audience:IT professional or developer
Want to validate your ability to successfully implement, build on, troubleshoot, and debug a particular Microsoft technology? A Microsoft Certified Technology Specialist (MCTS) certification proves your skills on a particular Microsoft technology, such as a Windows operating system, Microsoft Exchange Server, Microsoft SQL Server, or Microsoft Visual Studio.
Looking to build solutions in the cloud and on-premises? Prove your expertise on Microsoft core platform skills, including how to bring your business into the cloud, by earning a Microsoft Certified Solutions Associate (MCSA) certification, the foundation for your career in IT.
Duration : 2 Months
Exam Code :
Exam 70-511
MCTS: Microsoft .NET Framework 4, Windows Applications Development
Exam 70-515
MCTS: Microsoft .NET Framework 4, Web Applications Development
Why ISHA computer:
ISHA Computer is a leader in the high end
Latest technologies IT education industry and ITES . Organizations continue to upgrade, standardize and integrate their systems to develop and sustain their competitive edge.
Microsoft Certified Trainer
Industrial Experienced Faculty
Totally Practical Training on microsoft LAB
Dedicated Lab Facility (10 AM to 7 PM )
Week End Batch for the JOB Professional
JOB Assistance
Course Content : Exam 70-511:
MCTS: Windows Applications Development with Microsoft .NET Framework 4
Building a User Interface by Using Basic Techniques (23%)
Choose the most appropriate control class.
This objective may include but is not limited to: evaluating design requirements and then selecting the most appropriate control based on those requirements; recognizing when none of the standard controls meet requirements; item controls, menu controls, content controls
This objective does not include: designing a custom control
Implement screen layout by using nested control hierarchies.
This objective may include but is not limited to: using panel-derived controls, attaching properties
This objective does not include: items controls, control customization
Create and apply styles and theming.
This objective may include but is not limited to: application-level styles, overriding styles, style inheritance, Generic.xaml, theming attributes
This objective does not include: data-grid view style sharing
Manage reusable resources.
This objective may include but is not limited to: fonts, styles, data sources, images, resource dictionaries, resource-only DLLs
Implement an animation in WPF.
This objective may include but is not limited to: creating a storyboard; controlling timelines; controlling the behavior when the animation completes; double, color, and point animations; starting an animation from code and from XAML
This objective does not include: direct rendering updates, implementing key frame animations
Enhancing a User Interface by Using Advanced Techniques (21%)
Manage routed events in WPF.
This objective may include but is not limited to: tunneling vs. bubbling events, handling and cancelling events
This objective does not include: simple event handling; creating custom events
Configure WPF commanding.
This objective may include but is not limited to: defining WPF commands based on RoutedCommand; associating commands to controls; handling commands; command bindings; input gestures
This objective does not include: creating custom commands by implementing ICommand
Modify the visual interface at run time.
This objective may include but is not limited to: adding/removing controls at run time; manipulating the visual tree; control life cycle; generating a template dynamically
This objective does not include: instantiating forms and simple modification of control properties at runtime
Implement user-defined controls.
This objective may include but is not limited to: deciding whether to use a user/composite, extended, or custom control ; creating a user/composite control; extending from an existing control
This objective does not include: creating a custom control by inheriting directly from the Control class and writing code
Create and display graphics.
This objective may include but is not limited to: creating and displaying graphics by using geometric transformation; brushes; drawing shapes; clipping; double buffering; overriding Render (WPF) and OnPaint (WinForms); differentiating between retained and non-retained graphics
This objective does not include: creating and displaying three-dimensional graphics; hit testing; creating images
Add multimedia content to an application in WPF.
This objective may include but is not limited to: media player vs. media element; adding a sound player; images
This objective does not include: buffering
Create and apply control templates in WPF.
This objective may include but is not limited to: template binding
This objective does not include: styling and theming; data templating
Create data, event, and property triggers in WPF.
Managing Data at the User Interface Layer (23%)
Implement data binding.
This objective may include but is not limited to: binding options, static and dynamic resources, element bindings, setting the correct binding mode and update mode; binding to nullable values
This objective does not include: binding to a specific data source
Implement value converters in WPF.
This objective may include but is not limited to: implementing custom value converters, implementing multivalue converters
Implement data validation.
objective may include but is not limited to: handling validation and providing user feedback via the error provider (WinForms) or data templates (WPF), IDataErrorInfo, validation control, form validation and control validation
Implement and consume change notification interfaces.
This objective may include but is not limited to: implementing INotifyPropertyChanged; using INotifyCollectionChanged (ObservableCollection)
Prepare collections of data for display.
This objective may include but is not limited to: filtering, sorting, and grouping data; LINQ; CollectionView (WPF), BindingSource object (WinForms)
Bind to hierarchical data.
This objective may include but is not limited to: TreeView; MenuControl
Implement data-bound controls.
This objective may include but is not limited to: using the DataGridView (WinForms) or DataGrid (WPF) control to display and update the data contained in a data source, implementing complex data binding to integrate data from multiple sources; ItemsControl-derived controls (WPF)
Create a data template in WPF.
This objective may include but is not limited to: implementing a data template selector; using templates with ItemsControl
Enhancing the Functionality and Usability of a Solution (17%)
Integrate WinForms and WPF within an application.
This objective may include but is not limited to: using ElementHosts within WinForms and ControlHosts within WPF; using the PropertyMap property
Implement asynchronous processes and threading.
This objective may include but is not limited to: implementing asynchronous programming patterns; marshalling between threads; freezing UI elements; using timers; Task Parallel Library; parallel LINQ; using the dispatcher; BackgroundWorker component
Incorporate globalization and localization features.
This objective may include but is not limited to: loading resources by locale; marking localizable elements; using culture settings in validators and converters; using language properties and rendering direction properties; working with resource files for localization; determining installed locales; regional settings
Implement drag and drop operations within and across applications.
This objective does not include: Dynamic Data Exchange (DDE)
Implement security features of an application.
This objective may include but is not limited to: configuring Software Restriction Policy (SRP); full trust and partially trusted security; interoperability with legacy CAS policy; User Account Control (UAC)
Manage user and application settings.
This objective may include but is not limited to: creating application settings; creating user settings; loading and saving settings
This objective does not include: persisting to database
Implement dependency properties.
This objective may include but is not limited to: enabling data binding and animation, property metadata, property change callbacks
Stabilizing and Releasing a Solution (16%)
Implement a WPF test strategy.
This objective may include but is not limited to: automation peer, UI automation, IntelliTrace
Debug XAML by using the WPF Visualizer.
This objective may include but is not limited to: accessing the Visualizer, drilling down into the visual tree, viewing and changing properties
This objective does not include: setting a breakpoint and stepping through code
Debug WPF issues by using PresentationTraceSources.
This objective may include but is not limited to: animation, data binding, dependency properties
Configure a ClickOnce deployment.
This objective may include but is not limited to: configuring the installation of a WinForms, WPF, or XBAP application by using ClickOnce technology; choosing appropriate settings to manage upgrades
Create and configure a Windows Installer project.
This objective may include but is not limited to: configuring a setup project to add icons during setup, setting deployment project properties, configuring conditional installation based on operating system versions, setting appropriate Launch Conditions based on the .NET Framework version, adding custom actions to a setup project, adding error-handling code to a setup project
Configure deployment security settings.
This objective may include but is not limited to: configuring and integrating UAC by using ClickOnce deployments; setting appropriate security permissions to deploy the application
Course Content : Exam 70-515:
MCTS: Web Applications Development with Microsoft .NET Framework 4
Developing Web Forms Pages (19%)
Configure Web Forms pages.
This objective may include but is not limited to: page directives such as ViewState, request validation, event validation, MasterPageFile; ClientIDMode; using web.config; setting the html doctype
This objective does not include: referencing a master page; adding a title to a Web form
Implement master pages and themes.
This objective may include but is not limited to: creating and applying themes; adding multiple content placeholders; nested master pages; control skins; passing messages between master pages; switching between themes at runtime; loading themes at run time; applying a validation schema
This objective does not include: creating a master page; basic content pages
Implement globalization.
This objective may include but is not limited to: resource files, browser files, CurrentCulture, currentUICulture, ASP:Localize
Handle page life cycle events.
This objective may include but is not limited to: IsPostback, IsValid, dynamically creating controls, control availability within the page life cycle, accessing control values on postback, overriding page events
Implement caching.
This objective may include but is not limited to: data caching; page output caching; control output caching; cache dependencies; setting cache lifetimes; substitution control
This objective does not include: distributed caching (Velocity)
Manage state.
This objective may include but is not limited to: server-side technologies, for example, session and application; client-side technologies, for example, cookies and ViewState; configuring session state (in proc, state server, Microsoft SQL Server; cookieless); session state compression; persisting data by using ViewState; compressing ViewState; moving ViewState
Developing and Using Web Forms Controls (18%)
Validate user input.
This objective may include but is not limited to: client side, server side, and via AJAX; custom validation controls; regex validation; validation groups; datatype check; jQuery validation
This objective does not include: RangeValidator and RequiredValidator
Create page layout.
This objective may include but is not limited to: AssociatedControlID; Web parts; navigation controls; FileUpload controls
This objective does not include: label; placeholder, panel controls; CSS, HTML, referencing CSS files, inlining
Implement user controls.
This objective may include but is not limited to: registering a control; adding a user control; referencing a user control; dynamically loading a user control; custom event; custom properties; setting toolbox visibility
Implement server controls.
This objective may include but is not limited to: composite controls, INamingContainer, adding a server control to the toolbox, global assembly cache, creating a custom control event, globally registering from web.config; TypeConverters
This objective does not include: postback data handler, custom databound controls, templated control
Manipulate user interface controls from code-behind.
This objective may include but is not limited to: HTML encoding to avoid cross-site scripting, navigating through and manipulating the control hierarchy; FindControl; controlRenderingCompatibilityVersion; URL encoding; RenderOuterTable
This objective does not include: Visibility, Text, Enabled properties
Implementing Client-Side Scripting and AJAX (16%)
Add dynamic features to a page by using JavaScript.
This objective may include but is not limited to: referencing client ID; Script Manager; Script combining; Page.clientscript.registerclientscriptblock; Page.clientscript.registerclientscriptinclude; sys.require (scriptloader)
This objective does not include: interacting with the server; referencing JavaScript files; inlining JavaScript
Alter a page dynamically by manipulating the DOM.
This objective may include but is not limited to: using jQuery, adding, modifying, or removing page elements, adding effects, jQuery selectors
This objective does not include: AJAX
Handle JavaScript events.
This objective may include but is not limited to: DOM events, custom events, handling events by using jQuery
Implement ASP.NET AJAX.
This objective may include but is not limited to: client-side templating, creating a script service, extenders (ASP.NET AJAX Control Toolkit), interacting with the server, Microsoft AJAX Client Library, custom extenders; multiple update panels; triggers; UpdatePanel.UpdateMode; Timer
This objective does not include: basic update panel and progress
Implement AJAX by using jQuery.
This objective may include but is not limited to: $.get, $.post, $.getJSON, $.ajax, xml, html, JavaScript Object Notation (JSON), handling return types
This objective does not include: creating a service
Configuring and Extending a Web Application (15%)
Configure authentication and authorization.
This objective may include but is not limited to: using membership, using login controls, roles, location element, protecting an area of a site or a page
This objective does not include: Windows Live; Microsoft Passport; Windows and Forms authentication
Configure providers.
This objective may include but is not limited to: role, membership, personalization, aspnet_regsql.exe
This objective does not include: creating custom providers
Create and configure HttpHandlers and HttpModules.
This objective may include but is not limited to: generic handlers, asynchronous handlers, setting MIME types and other content headers, wiring modules to application events
•Configure initialization and error handling.
This objective may include but is not limited to: handling Application_Start, Session_Start, and Application_BeginRequest in global.asax, capturing unhandled exceptions, custom error section of web.config, redirecting to an error page; try and catch; creating custom exceptions
Reference and configure ASMX and WCF services.
This objective may include but is not limited to: adding service reference, adding Web reference, changing endpoints, wsdl.exe, svcutil.exe; updating service URL; shared WCF contracts assembly
This objective does not include: creating WCF and ASMX services
Configure projects and solutions, and reference assemblies.
This objective may include but is not limited to: local assemblies, shared assemblies (global assembly cache), Web application projects, solutions, settings file, configuring a Web application by using web.config or multiple .config files; assemblyinfo
Debug a Web application.
This objective may include but is not limited to: remote, local, JavaScript debugging, attaching to process, logging and tracing, using local IIS, aspnet_regiis.exe
Deploy a Web application.
This objective may include but is not limited to: pre-compilation, publishing methods (e.g.,
MSDeploy, xcopy, and FTP), deploying an MVC application
This objective does not include: application pools, IIS configuration
Displaying and Manipulating Data (19%)
Implement data-bound controls.
This objective may include but is not limited to: advanced customization of DataList, Repeater, ListView, FormsView, DetailsView, TreeView, DataPager, Chart, GridView
This objective does not include: working in Design mode
Implement DataSource controls.
This objective may include but is not limited to: ObjectDataSource, LinqDataSource, XmlDataSource, SqlDataSource, QueryExtender, EntityDataSource
This objective does not include: AccessDataSource, SiteMapDataSource
Query and manipulate data by using LINQ.
This objective may include but is not limited to: transforming data by using LINQ to create XML or JSON, LINQ to SQL, LINQ to Entities, LINQ to objects, managing DataContext lifetime
This objective does not include: basic LINQ to SQL
Create and consume a data service.
This objective may include but is not limited to: WCF, Web service; server to server calls; JSON serialization, XML serialization
This objective does not include: client side, ADO.NET Data Services
Create and configure a Dynamic Data project.
This objective may include but is not limited to: dynamic data controls, custom field templates; connecting to DataContext and ObjectContext
Developing a Web Application by Using ASP.NET MVC 2 (13%)
Create custom routes.
This objective may include but is not limited to: route constraints, route defaults, ignore routes, custom route parameters
Create controllers and actions.
This objective may include but is not limited to: Visual Studio support for right-click context menus; action filters (including Authorize, AcceptVerbs, and custom) and model binders; ActionResult sub-classes
Structure an ASP.NET MVC application.
This objective may include but is not limited to: single project areas (for example, route registration, Visual Studio tooling, and inter-area links); organizing controllers into areas; shared views; content files and folders
Create and customize views.
This objective may include but is not limited to: built-in and custom HTML helpers (for example, HTML.RenderAction and HTML.RenderPartial), strongly typed views, static page checking, templated input helpers, ViewMasterPage, ViewUserControl
This objective does not include: Microsoft.Web.Mvc Futures assembly
Cisco Certified Network Associate (CCNA)
Who should do / Attend the Course
Bachelor of Engineer ( EC, IT or CE)
This course is intended for students with one year of networking experience.
MCSA OR Hardware & Network Engineer

Duration :Four & Half month
Exam Code :200-120
Course Content
Fundamental of networking, Internetworking.
Fundamentals of CISCO Routers,
IP Numberings.(Subneting & Superneting),
IOS Installation, New Router Configuration.
Identifications of CISCO Component.,
IOS Command Management With CISCO Router,
IP Routing, Static & Dynamic with Multiple routers,
Managing CISCO Inert network,
TFTP Server configuration,
Managing Traffic and Security with Access List.,
Switching Technologies, VLAN, VTP,STP... Configuration.,
NAT Configurations.,* VPN Configurations.,
WAN (Wide Area Network) Protocol Configurations.
Cisco Certified Network Associate-Security (CCNA Security)
Who should do This Course
Valid Cisco CCNA or any candidate whom have more than 2 year experience in field of Networking an act as a prerequisite.
Duration :2 Months

Exam Code :640-553 or 640-554
Why ISHA computer:
ISHA Computer is a leader in the high end
Latest technologies IT education industry and ITES . Organizations continue to upgrade, standardize and integrate their systems to develop and sustain their competitive edge.
Industrial Experienced Faculty
Certified Trainer
Totally Practical Training on CISCO LAB
Dedicated Lab Facility (10 AM to 7 PM )
Week End Batch for the JOB Professional
JOB Assistance
Other student Benefits
Course Content
Understanding Network Security Principle.
Developing a Secure Network.
Defending the Perimeter.
Configuring AAA
Securing the Router.
Securing Layer 2 Devices.
Implementing Endpoint Security.
Exploring Secure Voice Solution.
Using Cisco IOS Firewalls to Defend the Network
Using Cisco IOS IPS to Secure the Network.
Designing a Cryptographic Solution.
Implementing Digital Signatures.
Exploring PKI and Asymmetric Encryption.
Building a Site-to-Site IPSec VPN Solution.
Cisco Certified Network Professional (CCNP)
The CCNP Program is a comprehensive program, which provides students with the Internet
technology skills essential in a global economy. The Program delivers Web-based content,
assessment, student performance monitoring, hands-on labs, certified instructor training and
support, and preparation for industry-standard certifications.
CCNP certification validates a network professional's ability to install, configure and
troubleshoot converged local and wide area networks with 100 to 500 or more nodes.
Network Professionals who achieve the CCNP have demonstrated the knowledge and skills
required to manage the routers and switches that form the network core, as well as edge
applications that integrate voice, wireless, and security into the network.
Prerequisites Valid Cisco Certified Network Associate (CCNA) certification or higher is recommended for
students to enroll in the Cisco Certified Network Professional (CCNP) curriculum and
thorough knowledge and understanding of LAN / WAN and Internet technologies.
CCNP Modules
(1) Implementing Cisco IP Routing (642-902: ROUTE)
(2) Implementing Cisco IP Switched Networks(642-813:SWITCH)
(3) Troubleshooting and Maintaining Cisco IP Networks (642-832: TSHOOT)
Who Should do this Course
Valid Cisco CCNA or any Candidate have more then 1 year experience in field of Networking can act as a
prerequisite.
Duration : 3 Months
Why ISHA Computer :
ISHA computer Technologies is a leader in the high end
Latest technologies IT education industry and ITES . Organizations continue to upgrade, standardize and integrate their systems to develop and sustain their competitive edge.
Industrial Experienced Faculty
Certified Trainer
Totally Practical Training on CISCO LAB
Dedicated Lab Facility (10 AM to 7 PM )
Week End Batch for the JOB Professional
Module 1: 642-902 ROUTE Exam Topics
Course Description
The Implementing Cisco IP Routing (ROUTE 642-902) is a qualifying exam for the Cisco Certified
Network Professional CCNP®, Cisco Certified Internetwork Professional CCIP®, and Cisco Certified
Design Professional CCDP® certifications. The ROUTE 642-902 exam will certify that the successful
candidate has the knowledge and skills necessary to use advanced IP addressing and routing in
implementing scalable and secure Cisco ISR routers connected to LANs and WANs. The exam also
covers configuration of secure routing solutions to support branch offices and mobile workers.
Course Topics
The following information provides general guidelines for the content likely to be included on the
exam. However, other related topics may also appear on any specific delivery of the exam. In order to
better reflect the contents of the exam and for clarity purposes the guidelines below may change at any
time without notice.
Implement an EIGRP based solution, given a network design and a set of requirements
Determine network resources needed for implementing EIGRP on a network
Create an EIGRP implementation plan
Create an EIGRP verification plan
Configure EIGRP routing
Verify EIGRP solution was implemented properly using show and debug commands
Document results of EIGRP implementation and verification
Implement a multi-area OSPF Network, given a network design and a set of requirements
Determine network resources needed for implementing OSPF on a network
Create an OSPF implementation plan
Create an OSPF verification plan
Configure OSPF routing
Verify OSPF solution was implemented properly using show and debug commands
Document results of OSPF implementation and verification plan
Implement an eBGP based solution, given a network design and a set of
requirements
Determine network resources needed for implementing eBGP on a network
Create an eBGP implementation plan
Create an eBGP verification plan
Configure eBGP routing
Verify eBGP solution was implemented properly using show and debug commands CCNP Course Outline
Document results of eBGP implementation and verification plan
Implement an IPv6 based solution, given a network design and a set of requirements
Determine network resources needed for implementing IPv6 on a network
Create an IPv6 implementation plan
Create an IPv6 verification plan
Configure IPv6 routing
Configure IPv6 interoperation with IPv4
Verify IPv6 solution was implemented properly using show and debug commands
Document results of IPv6 implementation and verification plan
Implement an IPv4 or IPv6 based redistribution solution, given a network design and a set of requirement
Create a redistribution implementation plan based upon the results of the redistribution analysis
Create a redistribution verification plan
Configure a redistribution solution
Verify that a redistribution was implemented
Document results of a redistribution implementation and verification plan
Identify the differences between implementing an IPv4 and IPv6 redistribution solution
Implement Layer 3 Path Control Solution
Create a Layer 3 path control implementation plan based upon the results of the redistribution
analysis
Create a Layer 3 path control verification plan
Configure Layer 3 path control
Verify that a Layer 3 path control was implemented
Document results of a Layer 3 path control implementation and verification plan
Implement basic teleworker and branch services
Describe broadband technologies
Configure basic broadband connections
Describe basic VPN technologies
Configure GRE
Describe branch access technologies
Implement Layer 3 Path Control Solution
Create a Layer 3 path control implementation plan based upon the results of the redistribution
analysis
Create a Layer 3 path control verification plan
Configure Layer 3 path control
Verify that a Layer 3 path control was implemented
Document results of a Layer 3 path control implementation and verification plan
Implement basic teleworker and branch services
Describe broadband technologies
Configure basic broadband connections
Describe basic VPN technologies
Configure GRE
Describe branch access technologies
Module 2 : 642-813 SWITCH Exam Topics
Module Description Implementing Cisco IP Switched Networks (SWITCH 642-813) is a qualifying exam for the
Cisco Certified Network Professional CCNP®, and Cisco Certified Design Professional CCDP® certifications. The SWITCH 642-813 exam will certify that the successful candidate has important knowledge and skills necessary to to plan, configure and verify the implementation of complex enterprise switching solutions using Cisco’s Campus Enterprise Architecture. The SWITCH exam also covers secure integration of VLANs, WLANs, voice and video into campus networks.
Module Topics
The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes the guidelines below may change at any time without notice.
Implement VLAN based solution, given a network design and a set of requirements
Determine network resources needed for implementing a VLAN based solution on a network
Create a VLAN based implementation plan
Create a VLAN based verification plan
Configure switch-to-switch connectivity for the VLAN based solution
Configure loop prevention for the VLAN based solution
Configure Access Ports for the VLAN based solution
erify the VLAN based solution was implemented properly using show and debug commands
Document results of VLAN implementation and verification
Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements
Determine network resources needed for implementing a Security solution
Create a implementation plan for the Security solution
Create a verification plan for the Security solution
Configure port security features
Configure general switch security features
Configure private VLANs Configure VACL and PACL
Verify the Security based solution was implemented properly using show and debug commands
Document results of Security implementation and verification CCNP Course Outline
Implement Switch based Layer 3 services, given a network design and a set of requirements
Determine network resources needed for implementing a Switch based Layer 3 solution
Create an implementation plan for the Switch based Layer 3 solution
Create a verification plan for the Switch based Layer 3 solution
Configure routing interfaces Configure Layer 3 Security
Verify the Switch based Layer 3 solution was implemented properly using show and debug commands
Document results of Switch based Layer 3 implementation and verification
Prepare infrastructure to support advanced services
Implement a Wireless Extension of a Layer 2 solution
Implement a VoIP support solution
Implement video support solution
PImplement High Availability, given a network design and a set of requirements
Determine network resources needed for implementing High Availability on a network
Create a High Availability implementation plan
Create a High Availability verification plan
Implement first hop redundancy protocols
Implement switch supervisor redundancy
Verify High Availability solution was implemented properly using show and debug commands
Document results of High Availability implementation and verification
Module 3 : 642-832 TSHOOT Exam Topics
Module Description
Troubleshooting and Maintaining Cisco IP Switched Networks (TSHOOT 642-832) is a qualifying exam for the Cisco Certified Network Professional CCNP®, certification. The TSHOOT 642-832 exam will certify that the successful candidate has important knowledge and skills necessary to (1) plan and perform regular maintenance on complex enterprise routed and switched networks and (2) use technology-based practices and a systematic ITILcompliant approach to perform network troubleshooting.
Module Topics
The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes the guidelines below may change at any time without notice.
Maintain and monitor network performance
Develop a plan to monitor and manage a network
Perform network monitoring using IOS tools
Perform routine IOS device maintenance
Isolate sub-optimal internetwork operation at the correctly defined OSI Model layer
Troubleshoot Multi Protocol system networks
Troubleshoot EIGRP
Troubleshoot OSPF
Troubleshoot eBGP
Troubleshoot routing redistribution solution
Troubleshoot a DHCP client and server solution, NAT
Troubleshoot first hop redundancy protocols
Troubleshoot IPv6 routing, IPv6 and IPv4 interoperability
Troubleshoot switch-to-switch connectivity for the VLAN based solution
Troubleshoot loop prevention for the VLAN based solution
Troubleshoot Access Ports for the VLAN based solution
Troubleshoot private VLANS
Troubleshoot port security
Troubleshoot general switch security
Troubleshoot VACL and PACL
Troubleshoot switch virtual interfaces (SVIs)
Troubleshoot switch supervisor redundancy
Troubleshoot switch support of advanced services (i.e., Wireless, VOIP and Video)
Troubleshoot a VoIP support solution, video support solution
Troubleshoot Layer 3 Security
Troubleshoot issues related to ACLs used to secure access to Cisco routers
Troubleshoot configuration issues related to accessing the AAA server for authentication
purposes
Troubleshoot security issues related to IOS services (i.e.,finger, NTP, HTTP, FTP, RCP etc.)
Juniper Network Certified Associate (JNCIA)
The Juniper Networks Certified Associate
certificate (JNCIA) is the entry-level credential required to continue to the advanced certifications in our Junos certification tracks. Successful candidates demonstrate knowledge of the Juniper Networks Junos
OS, networking fundamentals, and basic routing and
switching with Juniper routers
Designed for experienced networking professionals with beginner-intermediate knowledge of networking, this written exam verifies the candidate's understanding of the Juniper Networks Junos OS, networking fundamentals and basic routing and switching.

Duration : 1 1/2 Months
JNCIA-Junos Course Training and exam topics are based on the content of the recommended instructor led training courses, as well as the additional resources.

The JNCIA-Junos certification is valid for two years. Recertification is achieved by passing the JN0-101 exam.
Detailed Course Objectives include:
Junos OS Fundamentals
User Interface Options
Junos Configuration Basic
Operational Monitoring & Maintenance
Routing Fundamentals
Routing Policy and Firewall Filters
Class of Service
Networking Fundamentals
Ethical Hacking
SYLLABUS for Ethical Hacking & Informatics Security
Duration : 30 Days

Understanding Information Security, Securing the Physical Environment, Examining Operational Security, Working with Management and Policies, Understanding the Goals of Information Security, Comprehending the Security Process, Appreciating Antivirus Software, Implementing Access Control, Understanding Authentication, Authentication Issues to Consider, Distinguishing between Security Topologies, Setting Design Goals, Creating Security Zones, Working with Newer Technologies, Identifying Potential Risks, Calculating Attack Strategies, Understanding Access Attack Types, Recognizing Modification and Repudiation Attacks, Identifying Denial-of-Service and Distributed Denial-of-Service Attacks, Recognizing Common Attacks, Back Door Attacks, Spoofing Attacks,Man-in-the-Middle Attacks, Replay Attacks, Password-Guessing Attacks, Privilege Escalation,
Network Security Fundamental General Security Concept:
Identifying TCP/IP Security Concerns, Working with the TCP/IP Suite, Understanding Encapsulation, Working with Protocols and Services, Recognizing TCP/IP Attacks, Understanding Software Exploitation, Surviving Malicious Code, Viruses, Trojan Horses, Logic Bombs, Worms, Antivirus , Software, Understanding Social Engineering, Introducing Auditing Processes and Files.
Wireless Security:
Overview of Wireless Security,Authentication Using PSK, Authentication using 802.1x, WEP, AES, WPA, WAP-II, 802.11i, EAP, LEAP, EAP-fast, PEAP, Monitoring Security using WC
Application Security Cryptography Basics, Methods, and Standards:
An Overview of Cryptography, Understanding Physical Cryptography, Understanding Mathematical Cryptography, Working with Passwords, Understanding Cryptographic Algorithms, The Science of Hashing, Working with Symmetric Algorithms, Working with Asymmetric Algorithms, Using Cryptographic Systems, Confidentiality, Integrity, Digital Signatures, Authentication, Access Control, Using Public Key Infrastructure, Using a Certificate Authority, Working with Registration Authorities and Local Registration Authorities, Implementing Certificates, Understanding Certificate Revocation, Implementing Trust Models, Preparing for Cryptographic Attacks, Understanding Cryptography Standards and Protocols, The Origins of Encryption Standards, Public-Key Infrastructure X.509/Public-Key, Cryptography Standards, X.509, SSL and TLS, Secure Shell, HTTP Secure, IP Security, Tunneling Protocols
Database Security:
Excessive Privilege Abuse, Legitimate Privilege Abuse, Privilege Elevation, Database Platform Vulnerabilities, SQL Injection, Weak Audit Trail, Denial of Service , Database Communication Protocol Vulnerabilities, Weak Authentication, Backup Data Exposure
Securing servers Implementing and Maintaining a Secure Network:
Overview of Network Security Threats, Defining Security Baselines, Hardening the OS and NOS, Configuring Network Protocols, Hardening Microsoft Windows Vista, Hardening Microsoft Windows XP, Hardening Windows Server 2003, Hardening Microsoft Windows 2000, Updating Your Operating System, Hardening Network Devices, Updating Network Devices, Configuring Routers and Firewalls, Hardening Applications, Hardening Web Servers, Hardening E-Mail Servers, Hardening FTP Servers, Hardening DNS Servers, rdening NNTP Servers, Hardening File and Print Servers and Services, Hardening DHCP Services,
VMware Certified Professional (Desktop) (VCP)
VCP5 is now live! Be among the first to earn the newest certification and validate your skills on VMware’s latest release.
Learn more and reserve your seat today. As the demand for IT professionals with datacenter virtualization skills increases, it is essential to distinguish yourself in the market with a certification that validates your technical capabilities. Becoming a VMware Certified Professional does just that.
This industry-recognized certification requires completion of a VMware-authorized training course and hands-on experience with VMware technologies. Achieving the VCP certification confirms that you have the education needed to successfully install, deploy, scale and manage VMware vSphere environments, as well as the skills obtained by a minimum of six months experience with VMware infrastructure technologies.
The VMware Certified Professional – Desktop (VCP-DT) is directed toward Virtualization Systems Engineers who seek to demonstrate their ability to install and configure the VMware View environment and enable View Client users. Candidates must be able to configure the vSphere environment, possess a deep understanding of VMware core components and their relation to storage and networking, and be proficient in datacenter design methodologies.
The following VMware courses are recommended for VCP5-DT exam preparation but are not required :
VMware View: Install, Configure, Manage [V5.0]
VMware View: Install, Configure, Manage [V5.1]
Application Virtualization with VMware ThinApp
VMware View: Design Best Practices [V5.0]
VCP5-DT Benefits
VMware Certified Professional 5 – Desktop benefits include :
recognition in the industry.
official transcripts.
use of the “VMware Certified Professional 5 - Desktop” logo on business cards and Web site.
invitation to participate in beta classes and exams.
inclusion into an exclusive Desktop Community.
VMware Certified Professional
Course Objectives for this VMware training
At the end of the VMware vSphere: Install, Configure, Manage [V4.1] course, you should gain an understanding of the functionality in VMware vSphere 4 and be able to :
Install and configure ESX or ESXi
Install and configure vCenter Server components
Configure and manage ESX/ESXi networking and storage using vCenter Server
Deploy, manage, and migrate virtual machines
Manage user access to the VMware infrastructure
Use vCenter Server to monitor resource usage
Use vCenter Server to increase scalability
Use VMware vCenter Update Manager to apply ESX/ESXi patches
Use vCenter Server to manage higher availability and data protection
Following modules are covered in this VMware Virtualization training course
Course Introduction
Introduction to VMware Virtualization
Configuring ESXi/ESX
Installing and Using VMware vCenter Server
Networking
Storage
Virtual Machines
Access Control
Resource Monitoring
Scalability
High Availability and Data Protection
Configuration Management
Installing ESX
Pre-requisites for this VCP training course
Willingness to participate in a demanding, high-intensity training experience
Experience of System administration on Microsoft Windows or Linux operating systems
Comfort with system administration using command-line interfaces
Specialized Certification after VCP Training
VMware Certified Advanced Professional on vSphere 4 - Datacenter Administration – VCAP Training